Internet of Things information security protection method based on block chain

An information security and Internet of Things technology, which is applied in the field of Internet of Things information security protection methods and systems based on blockchain, can solve problems such as high system management and maintenance pressure, and achieve the effect of ensuring security.

Active Publication Date: 2019-06-14
CHONGQING UNIV OF POSTS & TELECOMM
View PDF10 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the rapid development of the Internet of Things, the types and numbers of Internet of Things devices will increase rapidly, and the management and maintenance of centralized systems will be under enormous pressure.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things information security protection method based on block chain
  • Internet of Things information security protection method based on block chain
  • Internet of Things information security protection method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The technical solutions in the embodiments of the present invention will be described clearly and in detail below with reference to the drawings in the embodiments of the present invention. The described embodiments are only some of the embodiments of the invention.

[0044] The technical scheme that the present invention solves the problems of the technologies described above is:

[0045] figure 1 is a schematic diagram of the system architecture of the present invention, figure 2 is a schematic flow chart of the system of the present invention, image 3 is a system architecture diagram of the present invention, Figure 4 It is the flow chart of Internet of things user access data, Figure 5 It is a flow chart of data information encryption.

[0046] A block-based Internet of Things information security protection method and system in this embodiment, including

[0047] a. Divide the IoT information security protection system into:

[0048]The perception layer ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention requests to an Internet of Things information security protection method based on a block chain. The method comprises the following steps: a, dividing an Internet of Things information security protection system; b, carrying out data segmentation on the received data information of the Internet of Things; c, establishing an index of a data block for the segmented data; and d, storingthe data in a Hash value returned by the IPFS system for encryption, and storing the encrypted ciphertext in a block chain. According to the invention, massive Internet of Things data information canbe effectively stored, illegal users can be tracked illegally, and the data privacy of the Internet of Things can be protected.

Description

technical field [0001] The invention belongs to the fields of information security protection technology, block chain technology and Internet of Things technology, and in particular relates to a block chain-based Internet of Things information security protection method and system. Background technique [0002] The Internet of Things refers to connecting any item with the Internet through information sensing equipment in accordance with the agreed agreement for information exchange and communication, so as to realize intelligent identification, positioning, tracking, monitoring and management. [0003] The application of the Internet of Things is very extensive, and can be applied to various fields such as military, industry, agriculture, power grid and water network, transportation, logistics, energy saving, environmental protection, medical and health care, and smart home. But while the Internet of Things provides people with more applications, it also faces many security ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 刘勇宋亮范时平黄海辉徐光侠吴佳健代小龙吴乾隆周秀秀
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products