Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Bluetooth mesh distributed blockchain data authorization encryption method

A technology of data authorization and encryption method, which is applied in the direction of digital transmission system, user identity/authority verification, secure communication device, etc., can solve problems such as inability to effectively discover access, user data stolen by illegal users, etc., to ensure that it is impossible Effects of reproducibility, guaranteed reliability and non-reproducibility

Active Publication Date: 2021-09-14
SHANGHAI MASHI INFORMATION TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] As an open specification for short-distance wireless data and voice communication, Bluetooth works in the free frequency band of 2.4GHz ISM, adopts fast frequency hopping spread spectrum technology, and has the advantages of fast communication speed, low power consumption, low cost, strong anti-interference, etc. Advantages, so it is widely used in various fields of life. However, because the technology uses wireless transmission, this may cause user data to be stolen by illegal users during transmission. The fast frequency hopping technology adopted by Bluetooth can only solve the system problem. Related interference problems caused by internal and external devices cannot be effectively discovered and accessed by illegal users. In the process of using Bluetooth Mesh, higher requirements are put forward for the security and privacy of each node. Based on The characteristics of Mesh distribution can use blockchain technology to encrypt system data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Bluetooth mesh distributed blockchain data authorization encryption method
  • A Bluetooth mesh distributed blockchain data authorization encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0017] see figure 1 and figure 2 , the present invention provides a kind of data authorization encryption method based on Bluetooth Mesh distributed blockchain, comprising the following steps:

[0018] S10: Build your own data layer, network layer, consensus layer, contract layer and application layer on each node;

[0019] S20: When performing data encryption, establish a data list and an encryption algorithm at the data layer, perform a single-point encry...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Bluetooth Mesh-based distributed block chain data authorization encryption method, which comprises the following steps: establishing its own data layer, network layer, consensus layer, contract layer and application layer on each node; performing data encryption At the same time, the data list and encryption algorithm are established in the data layer; the consensus algorithm in the Bluetooth Mesh network is established in the consensus layer; the authorization contract of the Bluetooth Mesh node is established in the contract layer to determine that each new node is newly added to the network. Or the information contract rules when exiting the network, the entire network of the present invention uses distributed encryption to complete the decentralization of the network, a block chain structure with high security and stability, and ensures the security of data in the entire network. Reliability and non-reproducibility. Bluetooth Mesh is currently mostly used in smart homes and smart cities. Using distributed authorization and encryption can ensure the non-reproducibility of each node and provide a unified platform for information traceability.

Description

technical field [0001] The invention relates to an encryption method, in particular to a Bluetooth Mesh distributed block chain data authorization encryption method. Background technique [0002] Since the birth of the first computer, after decades of rapid development, information technology has entered all aspects of our lives and is constantly changing our lives. We have entered an information age of information explosion, and a large amount of information relies on Traditional methods are difficult to achieve effective storage and transmission, so the development of information technology based on computer technology and network technology is particularly important. [0003] As an open specification for short-distance wireless data and voice communication, Bluetooth works in the free frequency band of 2.4GHz ISM, adopts fast frequency hopping spread spectrum technology, and has the advantages of fast communication speed, low power consumption, low cost, strong anti-inter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04W4/80H04W12/02
CPCH04L9/3247H04L63/0428H04W12/02H04W4/80
Inventor 李通越
Owner SHANGHAI MASHI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products