Data access method, system and device applied to Internet of Things

A data access and Internet of Things technology, applied in the field of Internet of Things security, can solve problems such as difficult to bear the computational overhead of encryption calculations, weak computing capabilities of Internet of Things sensing nodes, and consume large computing resources, so as to reduce energy costs and ensure data security , to avoid the effect of computing resources

Pending Publication Date: 2020-04-28
HANGZHOU HIKVISION DIGITAL TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the above method, encrypting data requires a large amount of computing resources, and the computing power of IoT sensing nodes is relatively weak, and it is difficult to bear the huge computing overhead brought by encryption operations.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data access method, system and device applied to Internet of Things
  • Data access method, system and device applied to Internet of Things
  • Data access method, system and device applied to Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0071] The terminology used in the present invention is for the purpose of describing particular embodiments only and is not intended to limit the invention. As used herein and in the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term "and / or" as use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data access method, system and device applied to the Internet of Things, and aims to reduce the computation overhead of a sensing node on the basis of ensuring the data security of the accessed sensing node. The data access method applied to the Internet of Things is applied to sensing node management equipment, and comprises the steps: receiving a reputation authentication request, wherein the reputation authentication request is sent by a sensing node after receiving an access request from a user and at least carries a user identifier of the user; sending the reputation authentication request to a reputation center device; receiving a reputation response returned by the reputation center device, wherein the reputation response at least carries a first reputationvalue of the user; verifying whether the user has the permission to access the sensing node according to the first reputation value, and sending authorization information to the user or the sensing node when verifying that the user has the permission to access the sensing node, so as to allow the user to access the sensing node.

Description

technical field [0001] The present invention relates to the technical field of Internet of Things security, in particular to a data access method, system and equipment applied to the Internet of Things. Background technique [0002] The Internet of Things (IoT) is a new type of network that uses a variety of communication technologies to interconnect a large number of sensing nodes. These sensing nodes form the sensing layer in the IoT architecture, collect data from different environments, process the data, and hand over the data to devices at other levels in the IoT architecture for processing. IoT has notable applications in multiple domains such as healthcare, transportation, and manufacturing, etc., playing an important role in the current digital life. [0003] At present, the security issues in the IoT environment still need to be fully considered, especially how to safely use the data collected by the sensing nodes. In the Internet of Things, the perception layer n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04W12/00G06F16/27G16Y40/50H04W12/06H04W12/08H04W12/60H04W12/69
CPCH04L67/12G06F16/27H04W12/009H04L63/101H04W12/66
Inventor 王滨王星万里
Owner HANGZHOU HIKVISION DIGITAL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products