Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internet of things multi-domain access control system and method based on block chain

An access control and access control strategy technology, applied in transmission systems, electrical components, etc., can solve the problems of trustworthiness and data privacy leakage, IoT sensitive leakage, data theft, etc., to promote safe sharing and privacy protection, data The privacy protection is high, and the effect of avoiding single point attacks

Active Publication Date: 2018-11-13
XIDIAN UNIV
View PDF2 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (1) The existing multi-domain access control system uses independent and centralized deployment of each domain, which makes the access control system vulnerable to attacks, resulting in technical problems such as data theft and system function failure
[0007] (2) The existing access control system is generally deployed in the same server as the data. Once the access control system is invaded, the sensitive Internet of Things will be leaked
[0008] (3) The traditional third-party access control system has problems of trustworthiness and data privacy leakage, and cannot realize safe and reliable sharing of data in various domains
[0009] (4) The independent deployment of the access control system in each domain makes the scalability of the system low. If a domain is added, each domain must update the access control policy
[0012] (2) The centralized system architecture can easily cause a single point of failure, resulting in the failure of the system function. To ensure the reliability of the access control system, the correctness of the function of the access control system can be guaranteed under certain unexpected error conditions
[0013] (3) The independent deployment of access control systems in each domain or the use of third-party access control systems cannot fundamentally solve the security sharing and privacy issues of IoT data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of things multi-domain access control system and method based on block chain
  • Internet of things multi-domain access control system and method based on block chain
  • Internet of things multi-domain access control system and method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049]In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0050] The present invention realizes a set of distributed multi-domain access control system by combining block chain technology and utilizing the characteristics of cryptography such as confidentiality, integrity and non-tampering, which promotes the safe sharing and privacy of data among various domains of the Internet of Things Protect.

[0051] Such as figure 1 As shown, the blockchain-based IoT multi-domain access control system provided by the embodiment of the present invention includes:

[0052] Network layer: such as figure 2 As shown, the network layer blockchain is composed of multiple domains of the Interne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of the internet of things access and control, and discloses an internet of things multi-domain access control system and method based on a block chain. A network layer is a block chain network, and an alliance block chain with various domains respectively taking charge of network nodes; a service layer is a distributed application intelligent contract developed based on the block chain network and can be used for executing complete machine language; a user layer is a user interaction interface developed based on the node of each domain, and used for providingaccess control permission registration and initiating a trans-domain access request. The safe access control system based on the block chain can be realized, the distributed storage of the access control policy is realized, and the access control policy is recorded on the block chain in an account book way, thereby realizing tamper resistance; the confidentiality, the completeness and the repudiation resistance of the cryptology technique and the tamper-resistance of the distributed account book of the block chain technology are combined so as to promote the safe and sufficient sharing of theinternet of things data.

Description

technical field [0001] The invention belongs to the field of Internet of Things access control, and in particular relates to a block chain-based Internet of Things multi-domain access control system and method. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: [0003] The Internet of Things is a huge network formed by combining various information sensing devices to collect in real time any required information such as objects or processes that need to be monitored, connected, and interacted, and combined with the Internet. The Internet in the information world extends to the physical world to form the Internet of Things. The Internet of Things is not only an expansion of scale, but also a connection between two material forms. Existing Internet of Things information service system solutions have problems in data sharing in terms of multi-dimensional data processing and data spatio-temporal correlation proces...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08H04L29/06
CPCH04L63/083H04L63/10H04L67/1095H04L67/1097H04L67/12
Inventor 沈玉龙郑佳伟邬俊杰郝飞扬胡晓康陈俊峰张立潘超杰常二慧马飞昊马冬洁
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products