Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cross-subnet access control method of electric power mobile terminal

A mobile terminal and access control technology, applied in the field of control, can solve problems such as inability to adapt to the system structure and inflexible terminal authorization management, and achieve the effect of taking into account the requirements of confidentiality

Active Publication Date: 2015-01-07
STATE GRID CORP OF CHINA +4
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there will be multiple sensor subnets in the perception layer of the Internet of Things, and mobile terminals frequently switch between sensor subnets. Most of the original access control mechanisms cannot adapt to this complex architecture.
In addition, traditional access control mechanisms are generally identity-based or role-based coarse-grained access control, and terminal authorization management is not flexible enough.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-subnet access control method of electric power mobile terminal
  • Cross-subnet access control method of electric power mobile terminal
  • Cross-subnet access control method of electric power mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] 1. Initialization of the sensor subnet

[0080] The gateway is denoted by W, first select the bilinear group G of order p 1 And the corresponding group G 2 , Use g for G 1 Generator of Is a bilinear mapping. W randomly generated subnet private key E k , Randomly generate the attribute private key I for each attribute i , I=A 1 , A 2 ...A N . For any sensor node in the subnet, the gateway W first generates the node private key for it And generate a node attribute encryption key for it according to the attribute set authorized to access the node data In the initialization phase of the sensor node, the node is preloaded with N sk And {P i }.

[0081] 2. Terminal registration stage

[0082] The terminal U enters the network range where the gateway W is located, and needs to register at the gateway W to access the node data in the network. The registration algorithm steps are as follows:

[0083] Step 1: Terminal U makes an access request to gateway W, sends registration infor...

Embodiment 2

[0094] A certain electricity consumption information collection system is networked through the Internet of Things. According to the layout of residential quarters, the network is divided into different subnets according to buildings, units, floors and other units. The nodes in the subnet are responsible for data collection in a certain area, and the collection nodes Due to the power limitation, the collected information is usually transmitted to the subnet gateway, processed by the subnet gateway and uploaded to the power system electricity consumption information collection platform. After the mobile terminal enters the electricity consumption information collection system, if it needs to access the node data information, it needs to register. After the terminal successfully registers and possesses the decryption key, the attributes are checked according to the threshold structure to access the node information. Through the attribute-based cross-subnet access control method, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a cross-subnet access control method of an electric power mobile terminal. The method includes the steps that (1), system initialization is performed; (2), an access request is put forward by the mobile terminal, registration is performed at a gateway of subnets, and the validity of an attribute certificate is verified to obtain an access right; (3), the attribute certificate is broadcast into the subnets, and according to a threshold structure, nodes inside the subnets verify the attribute certificate of the terminal and judge whether the access request of the terminal is responded or not; (4), ciphertext is calculated and transmitted to the terminal, and responding data are calculated according to the ciphertex and a decryption secrete key. Anonymous access of the mobile terminal and switching among the multiple subnets are flexibly achieved, corresponding access rights are set flexibly for the terminal according to the attribute of the terminal, and different threshold values can be set for the different subnets so as to meet respective access requirements.

Description

Technical field [0001] The invention relates to a control method, in particular to a method for controlling access to a power mobile terminal across subnets. Background technique [0002] The Internet of Things is the application of the Internet of Things in the smart grid. It is the result of the development of information and communication technology to a certain stage. It will effectively integrate the communication infrastructure resources and the power system infrastructure resources, improve the information level of the power system, and improve the current situation of the power system. With infrastructure utilization efficiency, it provides important technical support for power grid generation, transmission, transformation, distribution, and power consumption. The power Internet of Things for smart grid applications is mainly divided into a perception layer, a network layer and an application layer. The perception layer is at the forefront of information collection in the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/102
Inventor 陈璐张涛马媛媛何高峰管小娟黄秀丽华晔
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products