Internet-of-Things-oriented access control system and method based on smart contract
An access control and smart contract technology, applied in the field of Internet of Things, can solve problems such as information leakage, low cost, sensor network damage, etc., and achieve the effect of dynamic authority management and intelligent management
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0057] Such as figure 1 As shown, Embodiment 1 of the present disclosure provides an access control system for wireless sensor networks based on smart contracts, including: wireless sensor networks WSNs (Wireless sensor networks), management module (Manager), block chain (Blockchain network ) and Smart Contract (Smart Contract) four modules.
[0058] Wireless Sensor Networks (WSNs): WSNs organize and combine massive sensor nodes into a multi-hop, self-organizing network in a free manner through wireless communication technology, which can coordinate real-time sensing, collection and processing of sensing objects in the network coverage area. Information is transmitted wirelessly after information processing, and sent to users in a multi-hop self-organizing manner. Generally, WSN sensors have the characteristics of limited computing and storage capacity, low cost, and low security, so sensor nodes are vulnerable to external intrusion, resulting in information leakage or sensor...
Embodiment 2
[0080] Such as figure 2 As shown, Embodiment 2 of the present disclosure provides an access control method based on smart contracts for the Internet of Things. AC, AMC, and ACC represent proxy contracts, authority management contracts, and access control contracts, respectively, and are deployed in adjacent blocks , including the following steps:
[0081] The proxy contract (AC) sends an access policy request to the access control contract (ACC);
[0082] After the access control contract obtains the request, obtain from the authority management contract (AMC) whether there is an abnormal access event (such as frequent access, wrong address, etc.), and if it is normal, it will feed back to the proxy contract access policy;
[0083] If it is abnormal, the access control contract sends a credit value request to the rights management contract, and the rights management contract invokes the RBF algorithm to self-learn the access record, generate an access threshold (credit), and...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



