Secure interaction control method for intelligent terminal and server

A server security and intelligent terminal technology, applied in the field of intelligent terminal and server security interactive control, can solve the problems of single encryption method, product and corresponding server attack, attack server, etc., to achieve a high degree of anti-cracking, high security and anti- Effects of Attack Ability

Active Publication Date: 2021-07-20
中山亿联智能科技有限公司
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The traditional intelligent terminal exists and the server interaction protocol is simple, and the encryption method is single. Once the protocol and encryption algorithm are cracked by hackers, the product and the corresponding server face the risk of paralysis caused by large-scale attacks
[0004] Traditional smart terminals also have legitimate smart terminals being used as meat machines by hackers, which continuously attack the server and cause the server load to be too high, or meat machines simulate multiple smart terminals to continuously attack the server, resulting in server downtime

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure interaction control method for intelligent terminal and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0021] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0022] Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0023] It should be noted that when a component is said to be "fixed" to another component, it can be directly on the other component or there can also be an intervening component. When a component is said to be "connected" to another component, it may be directly connected to the other component or there may be intervening components at the same time.

[0024] Unless othe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an intelligent terminal and server secure interaction control method, which comprises the following steps of S1, establishing a delivery control system with an intelligent terminal, a network function server and a monitoring function module; S2, programming the encrypted hardware data and other random information in the OTP of the intelligent terminal; when a certain intelligent terminal is started, checking whether the OTP data of the intelligent terminal are matched with the local machine or not after being decrypted firstly, if not, limiting the function of the intelligent terminal, and allowing only software updating; and S3, when a network service function of a certain intelligent terminal is legally activated when the purchase activation code is legally activated, enabling the intelligent terminal to process hardware information and random data of the intelligent terminal according to multiple encryption algorithms and then submit the hardware information and the random data to the server together, and therefore, secure interaction and multiple identity verification selection are realized by monitoring a cloud server and the intelligent terminal, so that the anti-cracking degree is high, the method has high security and anti-attack capability, and has automatic operation and maintenance capability and intelligent capability.

Description

[technical field] [0001] The present invention relates to the technical field of security interaction control methods, in particular to a security interaction control method between an intelligent terminal and a server. [Background technique] [0002] With the rapid development of Internet infrastructure, the shipments of smart terminals continue to grow and become popular. How can smart terminals protect self-developed products and functions, and prevent product servers from being damaged by malicious attacks by competitors? How to strike a balance between cost and performance? These are the core concerns of the present invention. [0003] Traditional smart terminals have simple protocols for interacting with servers and single encryption methods. Once the protocols and encryption algorithms are cracked by hackers, the products and corresponding servers face the risk of being paralyzed due to large-scale attacks. [0004] Traditional smart terminals also have legitimate ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/083H04L63/101H04L63/0428
Inventor 游万俊任亮
Owner 中山亿联智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products