Unlock instant, AI-driven research and patent intelligence for your innovation.

Internet of Things terminal control method and system based on block chain

An IoT terminal and control method technology, applied in the control field of IoT terminals, can solve the problems of being easily attacked by hackers and insecure device instruction data, and achieve the effect of solving the problem of being easily attacked by hackers

Active Publication Date: 2022-03-01
北京豪尔赛智慧城域科技有限公司
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present application provides a technical solution with a high degree of security applicable to the Internet of Things to solve the technical problems of being easily attacked by hackers and insecure device instruction data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things terminal control method and system based on block chain
  • Internet of Things terminal control method and system based on block chain
  • Internet of Things terminal control method and system based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0045] For the convenience of description, unless otherwise specified, the terms involved in this application shall be understood according to the following descriptions. Blockchain is a series of text records that are connected and protected by cryptography. Concatenated text records are also called blocks. Each block contains the previous block en...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an Internet of Things terminal control method and system based on a block chain. The control method comprises the following steps: a first block chain node writes first control instruction information for controlling an Internet of Things terminal into a first smart contract and broadcasts the first smart contract; the second block chain node receiving the first smart contract performs dual verification for the first smart contract and the first block chain node; and when the dual verification is passed, the second block chain node links the first smart contract, and sends first control instruction information to the Internet of Things terminal. Hash value verification and intelligent contract consensus verification are carried out on the control instruction information, so that the technical problems that the equipment instruction data are easily attacked by hackers and are not safe can be solved.

Description

technical field [0001] The present application relates to the technical field of the Internet of Things, and in particular to a control method and system for an Internet of Things terminal based on blockchain. Background technique [0002] The security authentication permission control in the existing Internet of Things system and most software systems is based on the Abac method. Using Abac alone to implement authority security control is likely to cause security problems. Ddos attacks, violent cracking of databases, etc. have a great impact on IoT systems. [0003] According to Gartner's forecast, the number of IoT devices will exceed 20 billion by 2020, and the economic impact on industry and manufacturing will reach trillions of dollars. However, the sharp increase in the number of IoT devices has brought new security risks and challenges to IoT systems. For example, in 2018, researchers at KU Leuven University in Belgium discovered that by intercepting the signal of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G16Y30/10G16Y40/50
CPCG06F21/64G16Y30/10G16Y40/50
Inventor 戴聪棋彭洪宝杨耀威
Owner 北京豪尔赛智慧城域科技有限公司