Internet of Things privacy protection access control method based on block chain technology

An access control and privacy protection technology, applied in the field of Internet of Things, can solve the problems of untrustworthy nodes, easy failure of node authorization, low distributed management efficiency, etc., and achieve the effect of improving authorization efficiency.

Inactive Publication Date: 2019-11-29
GUANGDONG POWER GRID CO LTD +1
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] To this end, the embodiment of the present invention provides a privacy protection access control method for the Internet of Things based on blockchain technology, which uses smart contracts to authorize and manage Internet of Things devices, and introduces Token for authorization management, and sets and executes access contro

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things privacy protection access control method based on block chain technology
  • Internet of Things privacy protection access control method based on block chain technology

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0042] Specific implementation methods include:

[0043] The resource owner is device B, and the requester is device A;

[0044] work process:

[0045] Define S100 to S300 as the authorized access transaction stage of the resource owner's resource request to the requester, (GATransacTion)

[0046] 1. If device A (represented by address rq) wants to perform an operation such as modifying the temperature of device B (represented by rs), device B defines an access permission policy and sends it to device A as an access transaction. This access transaction is called GATransaction;

[0047] 2. The policy management point of device B (called wallet in Bitcoin) converts the policy into a script language POLICY rs,rq→πx;

[0048] 3. Device B generates a Token marked as TKN rs,rq, which is encrypted with the requester's public key;

[0049] 4. Send the access transaction, and each node verifies the validity of the transaction, and if it is valid, packs the access transaction into t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Internet of Things privacy protection access control method based on block chain technology. The method comprises the steps that a resource owner defines an access permission strategy for a resource request of a requester; a policy management point of a resource owner performs language transformation on the access permission policy, generates a Token at the same time, and encrypts the Token by using the public key of the requester, and the resource owner sends the access permission policy to the requester as a transaction; the strategy management point of the resource owner broadcasts the transaction to the Internet of Things network, and packages the transaction into the block chain after determining that the transaction is valid; the requester initiates the transaction through the Token sent by the resource owner, and sends a decryption script of the access permission strategy after language conversion to the resource owner at the same time; and the resource owner verifies the correctness of the decryption script, determines whether to give access control authority to the resources to the requester according to a verification result, and uplinks the transaction record in the blockchain after the decryption script is correct.

Description

technical field [0001] The embodiment of the present invention relates to the technical field of the Internet of Things, and in particular to a privacy protection access control method for the Internet of Things based on blockchain technology. Background technique [0002] IoT devices need to be identified, authenticated, and connected through a server, even if some devices are only a few feet away from each other, they must be connected through a server. The access control mechanism is used to manage resources in the Internet of Things and realize the controllable use of resources. The subject's right to use resources is expressed through access control policies. When the subject requests access to a resource, it will be based on the current access environment and access control The policy is evaluated to determine whether it has access to the resource. [0003] In the centralized IoT model, many traditional access control models are introduced. Examples include the role-...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3213H04L9/3228H04L63/0428H04L63/0807H04L63/10
Inventor 袁咏诗袁志坚翟柱新邹钟璐朱辉青瞿振陈皓宁全源黄志才李为黄贺平温思行陈寿瑜邓建中冯奕军陈小群聂滢
Owner GUANGDONG POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products