Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A cross-sub-network access control method for an electric power mobile terminal

A mobile terminal and access control technology, applied in the field of control, can solve problems such as inability to adapt to the system structure and inflexible terminal authorization management, and achieve the effect of taking into account the requirements of confidentiality

Active Publication Date: 2018-10-26
STATE GRID CORP OF CHINA +4
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there will be multiple sensor subnets in the perception layer of the Internet of Things, and mobile terminals frequently switch between sensor subnets. Most of the original access control mechanisms cannot adapt to this complex architecture.
In addition, traditional access control mechanisms are generally identity-based or role-based coarse-grained access control, and terminal authorization management is not flexible enough.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cross-sub-network access control method for an electric power mobile terminal
  • A cross-sub-network access control method for an electric power mobile terminal
  • A cross-sub-network access control method for an electric power mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] 1. Initialization of the sensor subnet

[0080] The gateway is denoted by W, first select the p-order bilinear group G 1 and the corresponding group G 2 , use g to represent G 1 generator of is a bilinear map. W randomly generates subnet private key E k , randomly generate attribute private key I for each attribute i , i=A 1 , A 2 ...A N . For any sensor node in the subnet, the gateway W first generates a node private key for it And generate a node attribute encryption key for it according to the attribute set authorized to access the node data During the sensor node initialization phase, the node is preloaded with N sk and {P i}.

[0081] 2. Terminal registration stage

[0082] When the terminal U enters the network range where the gateway W is located, it needs to register at the gateway W to access the node data in the network. The steps of the registration algorithm are as follows:

[0083] Step 1: Terminal U makes an access request to gateway W, s...

Embodiment 2

[0094] A power consumption information collection system is networked through the Internet of Things, and according to the layout of residential quarters, the network is divided into different subnets according to units such as buildings, units, floors, etc. The nodes in the subnet are responsible for data collection in a certain area, and the collection nodes Due to the limited power, the collected information is usually transmitted to the subnetwork gateway, which is processed by the subnetwork gateway and uploaded to the power system power consumption information collection platform. After the mobile terminal enters the electricity consumption information collection system, if it needs to access the node data information, it needs to register. After the terminal successfully registers and has the decryption key, it can only access the node information by checking the attributes according to the threshold structure. Through the attribute-based cross-subnet access control meth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a cross-subnet access control method of an electric power mobile terminal. The method includes the steps that (1), system initialization is performed; (2), an access request is put forward by the mobile terminal, registration is performed at a gateway of subnets, and the validity of an attribute certificate is verified to obtain an access right; (3), the attribute certificate is broadcast into the subnets, and according to a threshold structure, nodes inside the subnets verify the attribute certificate of the terminal and judge whether the access request of the terminal is responded or not; (4), ciphertext is calculated and transmitted to the terminal, and responding data are calculated according to the ciphertex and a decryption secrete key. Anonymous access of the mobile terminal and switching among the multiple subnets are flexibly achieved, corresponding access rights are set flexibly for the terminal according to the attribute of the terminal, and different threshold values can be set for the different subnets so as to meet respective access requirements.

Description

technical field [0001] The invention relates to a control method, in particular to a method for controlling cross-subnetwork access of electric mobile terminals. Background technique [0002] The power Internet of Things is the application of the Internet of Things in the smart grid. It is the result of the development of information and communication technology to a certain stage. With infrastructure utilization efficiency, it provides important technical support for power grid generation, transmission, transformation, distribution, and electricity consumption. The power Internet of Things for smart grid applications is mainly divided into perception layer, network layer and application layer, among which the perception layer is at the forefront of information collection in the Internet of Things system and plays a fundamental role in the realization of the Internet of Things. [0003] In the power Internet of Things environment, the perception layer has a large number of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/102
Inventor 陈璐张涛马媛媛何高峰管小娟黄秀丽华晔
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products