The intelligence of the intelligent device application platform is reflected in the fact that the system composed of heterogeneous devices has the characteristics of context awareness, task migration, intelligent collaboration, and multi-channel interaction.
Context-aware applications can capture, analyze the relationships between multiple objects, and make responses. Device collaboration refers to constructing new combined services with richer functions by coordinating the services provided by different devices and integrating the functions of existing available services. Multi-channel interaction is a human-computer interaction method that uses multiple channels to communicate with a computer, where the “channel” refers to the communication method for users to express intentions, perform actions, or perceive feedback information.
Security Goals
U - Ubiquitous: In the development trend of the ubiquitous network and secure ubiquitous Internet of Things, it aims to connect all that are not yet connected, including devices closely related to daily life—such as cars, refrigerators, washing machines, electricity meters, and health devices. Facing this ubiquity of networking, the protection provided by Bangbang Security can be applied to each networked endpoint/intelligent device, strengthening the anti-attack ability of endpoints and realizing the ubiquity of security protection.
S - Security: Comprehensive security protection for endpoints, networks, and clouds
Endpoints: Protection solutions based on the chip level, white-box protection, source code protection, strong authentication mechanisms, multiple verifications, etc.
Networks: Protection of communication protocols, communication authorization and authentication, traffic security filtering, etc.
Clouds: Mobile application security/behavior firewalls, secure storage, endpoint threat perception, risk big data analysis, etc.
C - Cloud: Provide security protection in the form of cloud services
Security protection: White-box password services, source code protection, vulnerability detection, security assessment, and channel monitoring.
Management and response: Endpoint threat perception, traffic behavior auditing, risk statistical analysis, and OTA upgrades.
The Internet of Things makes people think of a scenario where everything is connected. The security of such a large and complex network requires a systematic solution.
The security of intelligent devices is a very important part of Internet of Things security. That's why Bangbang Security Research Institute first proposed the concept of the “micro-boundary” in Internet of Things security and put forward the basic security protection principles:
1. Security should be ubiquitous at each micro-boundary point, enabling each micro-point to have security protection and anti-attack capabilities.
2. Security deployment and operation and maintenance should be able to adapt to a large number of diverse and multi - dimensional sensing devices.
3. The discovery, monitoring, and response to security threats should be able to be fine - grained down to each micro-boundary point.