IoT security and data privacy protection system based on blockchain

A data privacy and protection system technology, applied in the field of Internet of Things, can solve the security risks of the Internet of Things, data abuse and privacy violations of Internet of Things devices have not found universality, and failed to provide a unified key distribution mechanism, etc. problems, to achieve the effect of improving privacy protection security, realizing authorized use, and realizing non-repudiation

Active Publication Date: 2020-07-21
徐正伟 +2
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, the Internet of Things has become an important part of the Internet, and the number of global Internet of Things devices has maintained rapid growth. In the future Internet of Things, any individual, group, community, organization, object, product, data, service, process, and activity will They will be interconnected through the Internet of Things, and the privacy of personal data and commercial secrets in the Internet of Things have become an important shortcoming restricting the development of the Internet of Things. The current research and solutions on the security and privacy technologies of the Internet of Things have not played a good role in guaranteeing , Internet of Things security risks cause growing concern
[0003] Although there are various types of IoT security and data privacy solutions in the industry, none of these solutions can provide a good support for the unified key distribution mechanism, and the data abuse and privacy violations of IoT devices have failed. Find a more general solution

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IoT security and data privacy protection system based on blockchain
  • IoT security and data privacy protection system based on blockchain
  • IoT security and data privacy protection system based on blockchain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] refer to figure 1 , is a schematic diagram of an optional application environment of a specific embodiment of the present invention.

[0037] In this embodiment, the blockchain-based Internet of Things security and data privacy protection system includes an Internet of Things security engine and a blockchain network communicating with the Internet of Things security engine. like figure 1 As shown, the present invention can be applied to application environments including, but not limited to, IoT security engine A, IoT security engine B, and blockchain C. Among them, the IoT security engines A and B are hardware devices at the communication boundary of IoT devices that can be designed according to predetermined security rules, automatically encrypt and decrypt data, and encapsulate data transactions.

[0038] IoT security engines A and B are used for digital identity identification of IoT devices, device data encryption and demystification, and data transaction encapsu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a block chain-based internet of things safety and data privacy protection system. The system comprises an internet of things safety engine corresponding to internet of things equipment, and a block chain network communicated with the internet of things safety engine. The establishment of an access session channel with the internet of things equipment of an accessed party isrealized through the block chain network by the application program or the internet of things equipment of an access initiator. Meanwhile, the paid acquisition of the data usage right and the node accounting are completed through the block chain network according to data stored by the internet of things safety engine and corresponding digital right requirements. The internet of things safety engine can automatically carry out the data encryption and decryption operation and the data transaction packaging operation. According to the invention, a block chain network-based internet of things equipment unified key distribution mechanism is realized, so that the authorized use of the internet of things equipment and the establishment of a trust mechanism are effectively realized. Meanwhile, based on the block chain network, the data privacy and the data rights are protected. Therefore, the privacy protection safety of the data of the internet of things equipment is greatly improved.

Description

technical field [0001] The invention relates to the technical field of the Internet of Things, in particular to a blockchain-based Internet of Things security and data privacy protection system. Background technique [0002] At present, the Internet of Things has become an important part of the Internet, and the number of global Internet of Things devices has maintained rapid growth. In the future Internet of Things, any individual, group, community, organization, object, product, data, service, process and activity will They will be interconnected through the Internet of Things, and the privacy of personal data and business secrets in the Internet of Things have become an important shortcoming restricting the development of the Internet of Things. The current research and solutions on Internet of Things security and privacy technologies have not played a good role in guaranteeing , IoT security risks are causing increasing concerns. [0003] Although there are various type...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/0442H04L63/0823H04L63/0876H04L67/12
Inventor 徐正伟凌从礼滕建龙
Owner 徐正伟
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products