Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An access control method for smart home environment based on private chain

A smart home and access control technology, applied in the field of information security, can solve the problems of denial, deception of smart home owners, and the owner's unwillingness to pay for services.

Active Publication Date: 2020-09-25
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the following situations may exist: (a) In order to save access costs, the service provider does not periodically access the data of the relevant equipment as agreed, but forges access records to deceive the smart home owner; (b) the owner is unwilling to pay for the service Fees, while disavowing the visitor's access (service)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An access control method for smart home environment based on private chain
  • An access control method for smart home environment based on private chain
  • An access control method for smart home environment based on private chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0031] This embodiment provides an access control method for a smart home environment based on a private chain. The flow chart of access control for a smart home environment based on a private chain is as follows: figure 1 shown, including:

[0032] Initialization: First the smart home master for smart home manager Assign identity information and keys, and assign identity information to smart devices; then the owner writes the policy header into the first block of the private chain; finally, the smart home administrator communicates with the smart device and the smart home owner respectively. share different symmetric keys;

[0033] The specific method of initialization is:

[0034] The initialization algorithm selects a group G of prime order p 1 , a hash function H: {0, 1}*→Z p , a symmetric encryption algorithm E k′ (m) and a signcryption a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access control method for a smart home environment based on a private chain, and belongs to the technical field of information security. The method of the present invention includes initialization, registration, authentication, verification and revocation. Compared with the access control scheme of the prior art, the present invention can guarantee the confidentiality and integrity of the accessed data; can guarantee the two-way authentication of the identity of the owner and the visitor; can guarantee that a legitimate visitor can access after the deadline or After the registration information is forcibly revoked, access requests to device data can no longer be initiated, and the non-repudiation of the access behavior (including the accessed data and access time) and the unforgeability of the access records of the visitor and the owner can be guaranteed.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to an access control method for a smart home environment based on a private chain. Background technique [0002] The Internet of Things (Internet of Things) is a network that enables all ordinary objects that can perform independent functions to realize interconnection. The application range of the Internet of Things is very wide, mainly including the following aspects: transportation and logistics, health care, intelligent environment, personal and social fields, etc. As a successful IoT application, smart home has received widespread attention. Smart home converts the real-life family layout into a digital model, so that the digitization of personal information can reach a finer granularity. Data from smart devices can be used to provide home owners with a host of more efficient and personalized services. However, the hidden personal information in smar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L12/28
CPCH04L9/321H04L9/3236H04L9/3247H04L9/3297H04L12/2834H04L63/0435H04L63/083H04L63/10H04L63/123H04L63/126H04L63/20H04L65/1073H04L9/32H04L9/50
Inventor 许春香薛婧婷
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products