A cross-sub-network access control method for an electric power mobile terminal
A mobile terminal and access control technology, applied in the field of control, can solve problems such as inability to adapt to the system structure and inflexible terminal authorization management, and achieve the effect of taking into account the requirements of confidentiality
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0079] 1. Initialization of the sensor subnet
[0080] The gateway is denoted by W, first select the p-order bilinear group G 1 and the corresponding group G 2 , use g to represent G 1 generator of is a bilinear map. W randomly generates subnet private key E k , randomly generate attribute private key I for each attribute i , i=A 1 , A 2 ...A N . For any sensor node in the subnet, the gateway W first generates a node private key for it And generate a node attribute encryption key for it according to the attribute set authorized to access the node data During the sensor node initialization phase, the node is preloaded with N sk and {P i}.
[0081] 2. Terminal registration stage
[0082] When the terminal U enters the network range where the gateway W is located, it needs to register at the gateway W to access the node data in the network. The steps of the registration algorithm are as follows:
[0083] Step 1: Terminal U makes an access request to gateway W, s...
Embodiment 2
[0094] A power consumption information collection system is networked through the Internet of Things, and according to the layout of residential quarters, the network is divided into different subnets according to units such as buildings, units, floors, etc. The nodes in the subnet are responsible for data collection in a certain area, and the collection nodes Due to the limited power, the collected information is usually transmitted to the subnetwork gateway, which is processed by the subnetwork gateway and uploaded to the power system power consumption information collection platform. After the mobile terminal enters the electricity consumption information collection system, if it needs to access the node data information, it needs to register. After the terminal successfully registers and has the decryption key, it can only access the node information by checking the attributes according to the threshold structure. Through the attribute-based cross-subnet access control meth...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com