Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Decentralized Internet-of-Things cross-domain access authorization method and system

A decentralized and Internet of Things technology, applied in the field of Internet of Things and network security, can solve problems such as complex information flow between application domains, difficult maintenance, and unreadable authorization information

Pending Publication Date: 2020-10-27
GUANGZHOU UNIVERSITY
View PDF2 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, during the research and practice of the prior art, the inventors of the present invention found that the existing cross-domain authorization technology has the following defects: the centralized architecture is prone to single point of failure, once the central server fails to provide services, Authorization information will not be able to be read; secondly, due to the existence of a trusted third party, the information flow between various application domains becomes more complicated, and maintenance becomes more difficult, resulting in an increase in maintenance costs; in addition, the centralized architecture Rely on the absolute credibility of the third party, and in the current network environment, it is difficult for a certain node to be absolutely credible and safe, resulting in trusted third-party trust issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decentralized Internet-of-Things cross-domain access authorization method and system
  • Decentralized Internet-of-Things cross-domain access authorization method and system
  • Decentralized Internet-of-Things cross-domain access authorization method and system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0082] see Figure 1-2 .

[0083] Such as figure 1 As shown, this embodiment provides a decentralized Internet of Things cross-domain access authorization method, at least including the following steps:

[0084] S101. Build a blockchain network after initializing the trust domain system, and set the authentication servers in several trust domains as blockchain nodes; generate corresponding private keys for devices in corresponding domains through the authentication servers in each trust domain, And store the system information of each trust domain in the blockchain;

[0085] In a preferred embodiment, the step S101 is specifically:

[0086] Initialize the system parameters of the trust domain through the authentication server, including the additive cyclic group and multiplicative cyclic group used to initialize the system parameters, and the hash function used to generate the identity;

[0087] Generate the system master key through the authentication server, and generate...

no. 2 example

[0152] see Figure 3-4 .

[0153] Such as image 3 As shown, this embodiment provides a decentralized Internet of Things cross-domain access authorization system, including:

[0154] The trust domain system initialization module 100 is used to build a blockchain network after initializing the trust domain system, and set the authentication servers in several trust domains as blockchain nodes; The device generates the corresponding private key and stores the system information of each trust domain in the blockchain;

[0155] The authorization issuance module 200 is used to authorize and sign thresholds for the device through the smart contract when the device initiates a cross-domain authorization application to the authentication server in the trust domain where the device is located;

[0156] The cross-domain access module 300 is used to authenticate the device through the authentication server in the accessed trust domain when the device is accessed across domains; if the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a decentralized Internet-of-Things cross-domain access authorization method and system, and the method comprises the steps: building a blockchain network after initializing a trust domain system, and setting authentication servers in a plurality of trust domains as blockchain nodes; generating a private key for the equipment in the corresponding domain through the authentication server in each trust domain, and storing the system information of each trust domain in the blockchain; when the equipment authentication server initiates a cross-domain authorization application, enabling the authentication server to perform authorization and threshold signature on the equipment through the intelligent contract; when the equipment performs cross-domain access, performing identity authentication on the equipment through an authentication server in an accessed trust domain; and if the identity verification is passed, querying authorization information of the equipment through the blockchain network, verifying an authorized threshold signature, and allowing the equipment to perform cross-domain access after the signature verification is passed. According to the invention, decentralized cross-domain access authorization of the Internet-of-Things equipment can be realized, and the autonomy and initiative of the trust domain are ensured.

Description

technical field [0001] The present invention relates to the technical field of Internet of Things and network security, in particular to a decentralized Internet of Things cross-domain access authorization method and system. Background technique [0002] At present, the number of global Internet of Things devices is growing rapidly. According to relevant statistics and forecasts, the number of global Internet of Things devices will reach 25.2 billion in 2025. With the rapid development of the Internet of Things, the diversity of Internet of Things applications is brought, and there will inevitably be requirements for cross-domain access, value exchange, and collaborative control between different application systems. For example, the smart bracelet of the smart medical system first needs to be connected to the smart home system to obtain the environmental parameters of the patient's life, thereby providing reference data for the doctor's diagnosis. However, since the smart ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08H04L29/06
CPCH04L9/3255H04L9/0825H04L63/0876H04L63/10H04L9/50
Inventor 胡宁贾旭东殷诗赵琰程信达张弛
Owner GUANGZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products