Internet of things access control method with privacy protection based on blockchain

An access control and privacy protection technology, applied in the field of the Internet of Things, can solve the problems of access control method privacy leakage and other issues, and achieve the effect of protecting the privacy of access records and data privacy

Active Publication Date: 2021-07-09
GUANGXI NORMAL UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] What the present invention aims to solve is the problem of privacy leakage in existing access control methods based on blockchain technology, and provides a privacy-protected Internet of Things access control method based on blockchain technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of things access control method with privacy protection based on blockchain
  • Internet of things access control method with privacy protection based on blockchain
  • Internet of things access control method with privacy protection based on blockchain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in combination with specific examples and with reference to the accompanying drawings.

[0038] see figure 1 and 2 , a privacy-protected Internet of Things access control method based on blockchain, which specifically includes the following steps:

[0039] Step 1: The resource owner creates an authorization contract (Authorization Contract), and writes the authorization contract through an offline compiler to realize functions such as granting roles, adding roles, and deleting roles in the authorization contract.

[0040] The resource owner is the owner of the IoT device.

[0041] The authorization contract is used to grant roles and corresponding permissions to access requesters. For internal members, resource owners can directly add and delete role information through transactions. For external members, th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a privacy-protected Internet of Things access control method based on a block chain. A zero-knowledge proof algorithm is used to encrypt transactions and generate certificates. In this way, the privacy of transactions can be protected, and consensus nodes can be verified to reach a consensus. Then use the trusted execution environment to ensure the security of smart contracts and related data. At the same time, combined with the role access control model, the access requesters are classified, and different access requesters are given different permissions to achieve fine-grained access control. The invention can protect the data privacy and access record privacy of the user, and ensure that the privacy of the user will not be leaked due to the transparency of the blockchain data.

Description

technical field [0001] The invention relates to the technical field of the Internet of Things, in particular to an access control method of the Internet of Things with privacy protection based on a block chain. Background technique [0002] With the development of IoT, IoT occupies more and more important influence in different markets. The security and privacy issues of the Internet of Things have always been a challenge for the development of the Internet of Things. For the dynamics of IoT devices and the limitations of CPU, memory, and power, traditional centralized access control systems have been unable to meet the needs of IoT access control. [0003] With the development of blockchain technology, a new solution is provided for the access control of the Internet of Things. At present, there are many decentralized and non-tamperable features of blockchain technology, and the proposed solutions to the security and privacy issues of the Internet of Things can realize th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06H04L9/32G06Q40/04
CPCH04L67/12H04L63/0428H04L63/105H04L9/3218H04L67/1097G06Q40/04H04L9/50
Inventor 李先贤杨君豪石贞奎李杰付雪梅
Owner GUANGXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products