Unlock instant, AI-driven research and patent intelligence for your innovation.

Cross-domain logic strong isolation and secure access control method and device in Internet of Things scene

A technology of secure access control and strong logic isolation, applied in secure communication devices, instruments, digital transmission systems, etc., can solve the problems of unrealistic authentication nodes, threats to identity authentication security, and inability to effectively improve system security, etc., to achieve cross-border Strong isolation of domain logic, easy retrieval and reference, and improved security

Active Publication Date: 2019-07-05
TSINGHUA UNIV
View PDF6 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This leads to a problem: if the authentication node is hijacked, all IoT devices and user data in the domain are at risk; although in some solutions multiple authentication nodes can be deployed in the domain, the Usually mutual backup, this is only for improving system reliability, as long as one of the multiple authentication nodes is hijacked, it can greatly threaten the security of identity authentication, and cannot effectively improve system security
In addition, although the IoT gateway has more computing resources than the IoT nodes, it still cannot support the complex identity authentication process. It is unrealistic to always assume that the authentication nodes are safe or credible, so the above There is still room for improvement in the security of the access control scheme using a single authentication node

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-domain logic strong isolation and secure access control method and device in Internet of Things scene
  • Cross-domain logic strong isolation and secure access control method and device in Internet of Things scene
  • Cross-domain logic strong isolation and secure access control method and device in Internet of Things scene

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0051] The method and device for cross-domain logic strong isolation and secure access control in the Internet of Things scenario according to the embodiments of the present invention will be described below with reference to the accompanying drawings.

[0052] Firstly, the cross-domain logic strong isolation and security access control method under the Internet of Things scenario according to the embodiment of the present invention will be described with reference to the accompanying drawings.

[0053] figure 1 It is a flow cha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cross-domain logic strong isolation and secure access control method and device in an Internet of Things scene, and the method comprises the steps: enabling a certain Internet of Things gateway to broadcast an identity authentication request to other Internet of Things gateways in a domain after receiving the identity authentication request; after receiving the identity authentication request, starting to independently verify whether the identity authentication request is legal or not; after a certain Internet of Things gateway obtains an identity authentication result, starting a distributed consensus mechanism; after the Internet of Things gateway in the domain achieves consensus on authentication results through a distributed consensus mechanism, and then writing the identity authentication results into blocks and stored, and allowing the blocks to form a block chain. Therefore, the Internet of Things gateway in the domain carries out access control througha distributed consensus mechanism, cross-domain logic strong isolation is realized, the security of an Internet of Things system is effectively improved, and an identity authentication result is stored in a block in a block chain and has the characteristics of being public, transparent and traceable.

Description

technical field [0001] The present invention relates to the technical field of cyberspace security, in particular to a method and device for cross-domain logic strong isolation and secure access control in the Internet of Things scene. Background technique [0002] Access control technology is an important research content in the field of cyberspace security. This technology aims to prevent unauthorized access to any resources and ensure that computer systems are used within the legal scope. According to the definition of the International Telecommunication Union, the Internet of Things mainly solves the interconnection between items and items, items and people, and people. In the Internet of Things (Internet of Things) scenario, IoT nodes usually have limited computing power, and it is difficult to complete complex computing operations and access control, so the risk of being hijacked is high; the number of IoT nodes is large, and if IoT nodes are hijacked, Hackers can tak...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/02H04L63/10H04L67/1097H04L67/12H04L9/3239H04L2209/805H04L63/0236H04L63/102H04L63/123H04L63/0876H04L63/0823H04L9/50G16Y30/10H04L9/0833H04L9/0838H04L9/3213H04L9/3247H04L9/3273H04L63/0884H04L63/12
Inventor 徐恪吕亮吴波谭崎赵乙
Owner TSINGHUA UNIV