Access control method and system of Internet of Things, and user equipment

An access control and user equipment technology, applied in the field of Internet of Things, can solve the problems of time-consuming single access request verification, increase access control delay, key management burden, etc., to avoid key management burden, improve response speed, The effect of reducing the burden

Active Publication Date: 2021-08-31
GUANGZHOU UNIVERSITY
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, this model still has the following defects: 1. There is a problem of key management burden or high overhead in end-to-end communication; 2. It takes a long time to verify a single access request, which will increase the delay of access control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and system of Internet of Things, and user equipment
  • Access control method and system of Internet of Things, and user equipment
  • Access control method and system of Internet of Things, and user equipment

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0030] figure 1 A flowchart of an embodiment of an access control method for the Internet of Things according to the present invention is shown, and the method includes the following steps:

[0031] S1: Generate first access information according to the input operation of the first user, and perform identity-based encryption on the first access information in a preset encryption manner to generate a first access control request.

[0032] To realize the access control process of the IoT device, it is first necessary to determine the first IoT device that the first user wants to access and control according to the input operation of the first user, and the first user expects to control the first IoT device. operation, and obtain the first user's first capability token chain at the same time, so as to verify the legitimacy of the operation later. Therefore, the first access information should include the first capability token chain currently stored in the first user equipment, ...

specific Embodiment 2

[0047] figure 2 A flowchart showing another embodiment of the access control method for the Internet of Things according to the present invention, the method includes the following steps:

[0048] S1: Generate first access information according to the input operation of the first user, and perform identity-based encryption on the first access information in a preset encryption manner to generate a first access control request.

[0049] In fact, there is a prerequisite for the execution of this step, that is, the first user equipment must currently store the first capability token chain corresponding to the access control request, otherwise it will not be able to prove The legitimacy of its identity and operating authority. Therefore, if the first user needs to access and control the first IoT device, he should obtain the first capability token chain by inputting a capability token request instruction to the first user device, so as to complete the permission application proc...

specific Embodiment 3

[0074] In addition to the above method, the present invention also provides a user equipment of the Internet of Things. image 3 A structural diagram of an embodiment of a user equipment of the Internet of Things according to the present invention is shown. Such as image 3 As shown, the user equipment 15 includes: an instruction obtaining module 151 , an access control module 152 and a result receiving module 153 .

[0075] The instruction obtaining module 151 is used to generate first access information according to the input operation of the first user, and perform identity-based encryption on the first access information in a preset encryption method to generate a first access control request; The access information includes a first capability token chain currently stored in the first user equipment and a first IoT device to be controlled by the first user; the first capability token chain includes one or more first capability tokens .

[0076] The access control module...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access control method and systemof Internet of Things, and user equipment. The user equipment comprises an instruction acquisition module, an access control module and a result receiving module. The system comprises a central server, a proxy server, a gateway, Internet of Things equipment and user equipment. Through cooperation of an identity-based encryption technology and the proxy server based on a message queue transmission protocol, a digital certificate of a first user is verified in advance when a first permission token chain is generated, and after verification is passed, the digital certificate is placed in the first permission token chain and signed. The method, the user equipment and the system not only avoid the generation of a large number of keys and the subsequent key management burden, but also enable a verification program for the digital certificate of a visitor and a signature verification program of the first permission token chain to be carried out together, thereby accelerating the response speed of access control on the premise of ensuring the legality of the access control.

Description

technical field [0001] The present invention relates to the technical field of the Internet of Things, and relates to an access control method, user equipment and system of the Internet of Things. Background technique [0002] As a core information security technology, access control is used to manage user rights and prevent unauthorized operations. It plays a vital role in keeping the system secure and the business running smoothly. As an important part of the new generation of information technology, the Internet of Things (IoT) has been widely accepted and popularized, and has been gradually applied to many fields such as smart cities, Internet of Vehicles, and smart medical care. Although the widespread deployment and application of the Internet of Things has effectively solved the pain points in the development of multiple industries, the network security threats it faces have become more and more complex. The dispersal of IoT sensing nodes, the scale of data collecti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0807H04L63/0428H04L9/3213H04L9/3247H04L9/50
Inventor 李超殷丽华余震雷罗天杰罗熙孙哲王滨王星
Owner GUANGZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products