Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An access control method, user equipment, and system for the Internet of Things

A technology for access control and user equipment, applied in the field of the Internet of Things, can solve the problems of long time-consuming verification of a single access request, increased access control delay, and key management burden, so as to avoid key management burden, improve response speed, The effect of reducing the burden

Active Publication Date: 2022-02-11
GUANGZHOU UNIVERSITY
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, this model still has the following defects: 1. There is a problem of key management burden or high overhead in end-to-end communication; 2. It takes a long time to verify a single access request, which will increase the delay of access control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An access control method, user equipment, and system for the Internet of Things
  • An access control method, user equipment, and system for the Internet of Things
  • An access control method, user equipment, and system for the Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0030] figure 1 A flowchart of an embodiment of an access control method for the Internet of Things according to the present invention is shown, and the method includes the following steps:

[0031] S1: Generate first access information according to the input operation of the first user, and perform identity-based encryption on the first access information in a preset encryption manner to generate a first access control request.

[0032] To realize the access control process of the IoT device, it is first necessary to determine the first IoT device that the first user wants to access and control according to the input operation of the first user, and the first user expects to control the first IoT device. operation, and obtain the first user's first capability token chain at the same time, so as to verify the legitimacy of the operation later. Therefore, the first access information should include the first capability token chain currently stored in the first user equipment, ...

specific Embodiment 2

[0047] figure 2 A flowchart showing another embodiment of the access control method for the Internet of Things according to the present invention, the method includes the following steps:

[0048] S1: Generate first access information according to the input operation of the first user, and perform identity-based encryption on the first access information in a preset encryption manner to generate a first access control request.

[0049] In fact, there is a prerequisite for the execution of this step, that is, the first user equipment must currently save the first capability token chain corresponding to the access control request, otherwise it will not be able to prove in the subsequent first access control request that The legitimacy of its identity and operating authority. Therefore, if the first user needs to access and control the first IoT device, he should obtain the first capability token chain by inputting a capability token request instruction to the first user device...

specific Embodiment 3

[0074] In addition to the above method, the present invention also provides a user equipment of the Internet of Things. image 3 A structural diagram of an embodiment of a user equipment of the Internet of Things according to the present invention is shown. Such as image 3 As shown, the user equipment 15 includes: an instruction obtaining module 151 , an access control module 152 and a result receiving module 153 .

[0075] The instruction obtaining module 151 is used to generate first access information according to the input operation of the first user, and perform identity-based encryption on the first access information in a preset encryption method to generate a first access control request; The access information includes a first capability token chain currently stored in the first user equipment and a first IoT device to be controlled by the first user; the first capability token chain includes one or more first capability tokens .

[0076] The access control module...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access control method, user equipment and system of the internet of things. The user equipment includes an instruction obtaining module, an access control module and a result receiving module. The system includes a central server, a proxy server, a gateway, an Internet of Things device and a user device. Through the cooperation of identity-based encryption technology and proxy server based on message queue transmission protocol, at the same time, by verifying the digital certificate of the first user in advance when generating the first capability token chain, after the verification is passed, the digital certificate is placed in the In and signed in said first chain of capability tokens, the method, user device, and system not only avoid the generation of a large number of keys and the attendant key management burden, but also enable the verification of digital certificates for visitors The procedure is carried out together with the signature verification procedure of the first capability token chain, which improves the response speed of access control while ensuring the legitimacy of access control.

Description

technical field [0001] The present invention relates to the technical field of the Internet of Things, and relates to an access control method, user equipment and system of the Internet of Things. Background technique [0002] As a core information security technology, access control is used to manage user rights and prevent unauthorized operations. It plays a vital role in keeping the system secure and the business running smoothly. As an important part of the new generation of information technology, the Internet of Things (IoT) has been widely accepted and popularized, and has been gradually applied to many fields such as smart cities, Internet of Vehicles, and smart medical care. Although the widespread deployment and application of the Internet of Things has effectively solved the pain points in the development of multiple industries, the network security threats it faces have become more and more complex. The dispersal of IoT sensing nodes, the scale of data collecti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/32
CPCH04L63/0807H04L63/0428H04L9/3213H04L9/3247H04L9/50
Inventor 李超殷丽华余震雷罗天杰罗熙孙哲王滨王星
Owner GUANGZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products