Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and system for obtaining device usage authority based on the Internet of Things

A technology of permission acquisition and Internet of Things, applied in transmission systems, electrical components, etc., can solve problems such as the inability to protect the owner's private information and the inability to guarantee the security of transferred information

Active Publication Date: 2020-05-15
SHENZHEN SHENGLU IOT COMM TECH CO LTD
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a method and system for obtaining device use rights based on the Internet of Things, aiming at solving the problem that the security of the transferred information cannot be guaranteed and the owner cannot be protected when the use rights of various facilities in the Internet of Things are transferred in the prior art. The issue of private information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for obtaining device usage authority based on the Internet of Things
  • A method and system for obtaining device usage authority based on the Internet of Things
  • A method and system for obtaining device usage authority based on the Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] figure 1 A schematic diagram showing the distribution of various devices in the Internet of Things system in the prior art, such as figure 1 As a management platform, the Internet of Things shown in can be applied in many aspects such as intelligent transportation, construction, medical care, environmental protection, public safety, mobile POS, supply chain, agriculture, forestry, water affairs, and finance. In terms of public security, the Internet of Things can uniformly receive security information transmitted by all parties through the management platform, and connect various security equipment to the Internet of Things management system through the Internet. The networked management system dispatches nearby related equipment to deal with potential safety hazards.

[0056] When applied to various public resources in the city, each user in the city can use the equipment he owns as a public resource for everyone to use, so as to save resources and maximize the use of...

Embodiment 2

[0090] Figure 5 It shows a flow chart of a method for obtaining device usage authority based on the Internet of Things provided by the second embodiment of the present invention; Figure 5 As shown, the method for obtaining device usage authority based on the Internet of Things includes:

[0091] Step S51, receiving the authentication information sent by the server, the owner information and the equipment information in normal state;

[0092] In this step, the server first checks and judges the agent, and when the agent meets the preset conditions, it is determined to be a legal agent; only the legal agent has the agency authority, and sends the authentication information to the legal agent end. The server counts various devices under normal use in the Internet of Things system within a certain range, as well as the owner information of the devices, and integrates these information and sends them to the agent with agency authority. The authentication information includes: ...

Embodiment 3

[0102] Image 6 It shows a flow chart of a method for obtaining device usage authority based on the Internet of Things provided by the third embodiment of the present invention; Image 6 As shown, the method for obtaining device usage authority based on the Internet of Things includes:

[0103] Step S61, receiving the authentication information sent by the server, the owner information and the equipment information in normal state;

[0104] Step S62, receiving the user's request for the use right of the device, obtaining user information according to the user's request for the use right of the device, and receiving the entrustment certificate sent by the owner;

[0105] Step S63, decrypting the entrusted certificate, and verifying the validity of the entrusted certificate;

[0106] Step S64, when the entrustment credential is valid, determine whether the user's request for the device use right meets the conditions for obtaining the device use right;

[0107] Step S65, when ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided in the present embodiment are a method and system for acquiring usage permissions of an Internet of Things equipment. The method comprises: according to a request by a user for usage permissions of an equipment, acquiring user information and receiving a delegation certificate that is sent by an owner terminal; decrypting and validating the validity of the delegation certificate, and determining whether the request by the user for the usage permissions of the equipment meets a condition for acquiring the usage permissions of the equipment; when the condition is met, generating an authorization certificate; encrypting the authorization certificate and then sending the encrypted authorization certificate to the user such that the user validates the authorization certificate by means of the equipment. The user acquires usage permissions of an equipment by means of requesting a proxy terminal, and the proxy terminal acquires information, such as a delegation certificate and so on, from the owner terminal according to the request by the user, thus avoiding direct information exchange between the user and an owner, and thus the safety of personal information of the owner may be protected, while a permissions acquisition request of the user for the equipment may be satisfied.

Description

technical field [0001] Embodiments of the present invention belong to the field of information security of the Internet of Things, and in particular relate to a method and system for obtaining device use rights of the Internet of Things. Background technique [0002] The Internet of Things is the Internet that connects things. It is predicted to be another wave of technology and economy in the global information industry after the Internet. It has attracted the attention of governments, enterprises and academic circles. Regional informatization strategy. At present, IoT applications face many problems in the development process. First of all, it can be seen from the architecture of the Internet of Things that there are many types of Internet of Things terminals, and most of the facilities in daily life can be connected to the Internet of Things system through radio frequency technology. Therefore, how to effectively manage these terminal facilities is One of the first issu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/0884H04L63/108H04L67/12
Inventor 杜光东
Owner SHENZHEN SHENGLU IOT COMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products