Access control method for smart home environment based on private blockchain

A smart home and access control technology, applied in the field of information security, can solve problems such as deceiving smart home owners, denial, and owners' unwillingness to pay service fees

Active Publication Date: 2018-10-09
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the following situations may exist: (a) In order to save access costs, the service provider does not periodically access the data of the relevant equipment as agreed, but forges access records to deceive the smart home owner; (b) the owner is unwilling to pay for the service Fees, while disavowing the visitor's access (service)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method for smart home environment based on private blockchain
  • Access control method for smart home environment based on private blockchain
  • Access control method for smart home environment based on private blockchain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention will be further described below with reference to the drawings and embodiments.

[0031] This embodiment provides a method for access control of a smart home environment based on a private chain. The flow chart of access control for a smart home environment based on a private chain is as follows: figure 1 Shown, including:

[0032] Initialization: first the smart home owner As a smart home manager Assign identity information and keys, and assign identity information to smart devices; then the owner writes the policy header into the first block of the private chain; finally, the smart home administrator and the smart device and smart home owner respectively Share different symmetric keys;

[0033] The specific method of initialization is:

[0034] The initialization algorithm selects a group G of prime order p 1 , A hash function H: {0, 1}*→Z p , A symmetric encryption algorithm E k′ (m) and a signcryption algorithm SC k′ (m), where the superscript * is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access control method for a smart home environment based on a private blockchain and belongs to the technical field of information security. The method provided by the invention comprises the steps of initialization, registration, authentication, verification and revocation. Compared with an access control scheme in the prior art, the method has the advantages that the confidentiality and integrality of accessed data can be ensured; the bidirectional identity authentication between an owner and an visitor can be ensured; a legal visitor cannot initiate an access request to device data after an access deadline arrives or the registration information is revoked compulsorily; and the non-repudiation of the visitor and the owner for an access behavior (comprising theaccessed data and access time) and the unforgeability of an access record are also ensured.

Description

Technical field [0001] The invention belongs to the technical field of information security, and specifically relates to an access control method for a smart home environment based on a private chain. Background technique [0002] The Internet of Things (Internet of Things) is a network that allows all ordinary objects that can perform independent functions to be interconnected. The application range of the Internet of Things is very wide, mainly including the following aspects: transportation and logistics, health care, smart environment, personal and social fields, etc. As a successful application of the Internet of Things, smart homes have received widespread attention. Smart homes convert real-life home layouts into digital models, so that the digitization of personal information reaches a finer granularity. The data of smart devices can be used to provide a large number of more efficient personalized services for home owners. However, the hidden personal information in sm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L12/28
CPCH04L9/321H04L9/3236H04L9/3247H04L9/3297H04L12/2834H04L63/0435H04L63/083H04L63/10H04L63/123H04L63/126H04L63/20H04L65/1073H04L9/32H04L9/50
Inventor 许春香薛婧婷
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products