Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A distributed authorization management method in the context of the Internet of Things

An authorization management and distributed technology, applied in user identity/authority verification, digital transmission systems, electrical components, etc., can solve the problems of lack of audit supervision measures, single point of failure, high platform dependence, etc., to solve the problem of single point of failure Effect

Active Publication Date: 2018-12-25
NO 15 INST OF CHINA ELECTRONICS TECH GRP +1
View PDF8 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] In view of this, the present invention provides a distributed authorization management method in the Internet of Things scenario, which can solve the problems of single point of failure, authorization highly dependent on the platform and lack of audit supervision measures in the existing authorization system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0087] The present invention will be described in detail below in conjunction with the embodiments.

[0088] The present invention has the following roles: resource owner, authorized agent and resource user. In the Internet of Things system, resource services refer to the services that terminal devices connected to the Internet of Things can provide for users of the Internet of Things system. Resource owners refer to the owners of terminal devices connected to the Internet of Things system, authorized agents, and generally The platform is responsible for authorizing and managing the resources of resource owners. A resource user is a person who uses a resource.

[0089] The premise of using the method of the present invention is that resource owners, authorized agents, and resource users register their identities on the block chain platform and obtain their respective public key information and private key information. Resource ownership information has been registered on the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a distributed authorization management method under the scene of the internet of things, which adopts the block chain technology to realize the distributed right granting process. Taking advantage of the immutability of block chains, to implement resource authorization information, public audit of important information such as authorization and power transfer information, In addition, there are many users in Internet of Things applications, resource device high accessfeature, to free the device owner from the authorization process, the function of proxy authorization and revoking proxy authorization is designed, the addition of these two features is more in line with the usage scenario of the Internet of Things application, The invention adopts the block chain technology to realize the authorization of the resource service, thoroughly solves the problem of single point failure, and all the information stored on the block chain is open and transparent, the authority transfer process is recorded on the block chain, and all links of the authorization are supervised and controlled by the whole network node.

Description

technical field [0001] The invention belongs to the technical field of Internet of Things authorization management, and in particular relates to a distributed authorization management method in the Internet of Things scene. Background technique [0002] A typical IoT system generally has three layers: device layer, platform layer, and application layer. In a three-layer IoT system, device resource information is generally stored in the IoT platform system. When an application needs to use resource services, the The IoT platform provides service access interfaces to applications. When the IoT platform provides a resource service interface for the application platform, it first needs to determine that the resource owner allows the application to use the resource service, that is, to complete the resource authorization. [0003] Currently the most popular solution is the oauth authorization protocol. In this protocol, there are four roles: resource owner, resource server, clie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/32
CPCH04L9/3247H04L9/3297H04L63/08H04L63/0876H04L63/102H04L63/108H04L63/12H04L67/12
Inventor 刘芳吕仁健汪涵程凯张永顾平莉
Owner NO 15 INST OF CHINA ELECTRONICS TECH GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products