Internet of Things access control method and system

An access control, Internet of Things technology, applied in the field of blockchain, can solve the problems of malicious tampering of the Internet of Things data center, equipment can not be used normally, user privacy leakage, etc., to ensure normal use, improve security and reliability. , the effect of preventing privacy leakage

Active Publication Date: 2019-12-03
SICHUAN NORMAL UNIVERSITY
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In traditional technologies, the centralized access control strategy of the Internet of Things access control architecture has hidden dangers such as malicious operations by managers, or external users pretending to be authorized users for illegal access, or malicious tampering of the data center of the Internet of Things, which can easily cause users to fail. Privacy is leaked and the device cannot be used normally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things access control method and system
  • Internet of Things access control method and system
  • Internet of Things access control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention.

[0058] The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0059] Hereinafter, the terms "comprising",...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an Internet of Things access control method and system, which are applied to a central control terminal of the Internet of Things. The method comprise the following steps: sending a first authority query request to a block chain platform according to a received device access operation request sent by an access user; wherein the equipment access operation request comprises an access operation request instruction; receiving a first query result returned by the blockchain platform according to the first permission query request; wherein the first query result comprises an access operation instruction permission set of the access user to the Internet of Things central control terminal; if the access operation instruction to be requested is included inthe access operation instruction permission set, sending an access permission instruction to the access user; and publishing the access record of the access operation of the access user on the centralcontrol terminal of the Internet of Things to the blockchain platform. According to the invention, privacy leakage of the user is further prevented, and normal use of each intelligent device in the Internet of Things is ensured.

Description

technical field [0001] The present invention relates to the technical field of block chains, in particular to an access control method and system for the Internet of Things. Background technique [0002] The Internet of Things is a ubiquitous network built on the Internet, which integrates a large number of micro-devices such as massive sensors and intelligent processing terminals with the Internet through wired or wireless. With the widespread application and popularization of the Internet of Things, its security and privacy issues have become important issues that need to be broken through. In traditional technologies, the centralized access control strategy of the Internet of Things access control architecture has hidden dangers such as malicious operations by managers, or external users pretending to be authorized users for illegal access, or malicious tampering of the data center of the Internet of Things, which can easily cause users to fail. Privacy is leaked, and th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/10H04L67/12H04L67/1097H04L63/12H04L9/50
Inventor 谭良石娜
Owner SICHUAN NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products