CA3160728A1 - Method of realizing intelligent equipment system, method of controlling intelligent equipement, and system - Google Patents
Method of realizing intelligent equipment system, method of controlling intelligent equipement, and systemInfo
- Publication number
- CA3160728A1 CA3160728A1 CA3160728A CA3160728A CA3160728A1 CA 3160728 A1 CA3160728 A1 CA 3160728A1 CA 3160728 A CA3160728 A CA 3160728A CA 3160728 A CA3160728 A CA 3160728A CA 3160728 A1 CA3160728 A1 CA 3160728A1
- Authority
- CA
- Canada
- Prior art keywords
- user
- smart contract
- equipment
- intelligent equipment
- intelligent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 75
- 230000006870 function Effects 0.000 claims abstract description 73
- 238000012795 verification Methods 0.000 claims description 58
- 239000002131 composite material Substances 0.000 claims description 20
- 238000012790 confirmation Methods 0.000 claims description 15
- 238000012986 modification Methods 0.000 claims description 13
- 230000004048 modification Effects 0.000 claims description 13
- 238000012217 deletion Methods 0.000 claims description 12
- 230000037430 deletion Effects 0.000 claims description 12
- 230000000052 comparative effect Effects 0.000 claims description 9
- 230000008569 process Effects 0.000 description 6
- 230000008901 benefit Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Abstract
The present invention belongs to the technical field of block chain technology, and disclosed thereby are an an implementation method for a smart device system, a smart device control method and system. The method comprises: forming a private chain network for a plurality of smart devices connected to a local area network; each smart device respectively obtaining a smart contract having a plurality of functions which is issued by a user, and deploying the smart contract to the private chain network after being authenticated by users; when a smart device receives an initialization request of a user, the smart device obtaining user sensitive data in the device initialization request and generating corresponding first initial information for the user sensitive data; and calling an adding function of the smart contract to write the first initial information into the private chain. According to the embodiments of the present invention, the user sensitive data acquired by the smart device is stored on the private chain by means of the smart contract, which can avoid the leakage of user sensitive data and fully guarantee the privacy and security of the user sensitive data.
Description
METHOD OF REALIZING INTELLIGENT EQUIPMENT SYSTEM, METHOD OF
CONTROLLING INTELLIGENT EQUIPMENT, AND SYSTEM
BACKGROUND OF THE INVENTION
Technical Field [0001] The present invention relates to the field of blockchain technology, and more particularly to a method of realizing an intelligent equipment system, methods of controlling an intelligent equipment, and a corresponding system.
Description of Related Art
CONTROLLING INTELLIGENT EQUIPMENT, AND SYSTEM
BACKGROUND OF THE INVENTION
Technical Field [0001] The present invention relates to the field of blockchain technology, and more particularly to a method of realizing an intelligent equipment system, methods of controlling an intelligent equipment, and a corresponding system.
Description of Related Art
[0002] The intelligent equipment is any of an equipment, apparatus or machine having computing and processing capabilities. With the increasing development of science, more and more intelligent equipments appear in the everyday life of people, such as smart locks, smart speakers, intelligent air-conditioners, intelligent television sets, and intelligent routers, etc., these intelligent equipments are accessed to the network via the WiFi of household routers, and are subsequently controlled by application programs of mobile phones.
[0003] As the inventor has found in the process of implementing the present invention, the data are currently available intelligent equipments are mostly stored in the cloud servers of manufacturers, and then controlled via handset terminals, but this practice tends to cause leakage of personal information, and it is also made possible at the same time for illegal individuals to take advantage of loopholes to tamper with the data, so as to achieve the objective of controlling the intelligent equipments.
Date Recue/Date Received 2022-05-09 SUMMARY OF THE INVENTION
Date Recue/Date Received 2022-05-09 SUMMARY OF THE INVENTION
[0004] An objective of the present invention it is to provide a method of realizing an intelligent equipment system, methods of controlling an intelligent equipment, and a corresponding system, whereby user sensitive data in the intelligent equipment is stored on a private blockchain through a smart contract, and it is made possible to avoid leakage of the user sensitive data, and to fully guarantee privacy and safety of the user sensitive data.
[0005] Specific technical solutions provided by the embodiments of the present invention are as follows.
[0006] According to the first aspect, there is provided a method of realizing an intelligent equipment system, and the method comprises:
[0007] constituting a private blockchain network out of a plurality of intelligent equipments accessed to a local area network;
[0008] obtaining, by each of the intelligent equipments, a smart contract having a plurality of functions released by a user, and deploying the smart contract onto the private blockchain network after confirmation by the user;
[0009] obtaining, by the intelligent equipment, user sensitive data in an equipment initialization request, when the intelligent equipment receives the equipment initialization request from the user; and
[0010] generating corresponding first initial information for the user sensitive data, and invoking an addition function of the smart contract to write the first initial information in a private blockchain.
[0011] Further, after the step of invoking an addition function of the smart contract to write the information in a private blockchain, the method further comprises:
[0012] obtaining, by the intelligent equipment, user input data in an equipment use request, when the intelligent equipment receives the equipment use request from the user, and Date Recue/Date Received 2022-05-09 generating corresponding information to be enquired for the user input data;
[0013] invoking a query function of the smart contract to enquire the information to be enquired in the private blockchain; and
[0014] determining, by the intelligent equipment, whether a use operation is allowed according to a query result of the smart contract.
[0015] Further, the user sensitive data is initial fingerprint data input by the user, and the step of generating corresponding first initial information for the user sensitive data, and invoking an addition function of the smart contract to write the first initial information in a private blockchain includes:
[0016] converting, by the intelligent equipment, the initial fingerprint data to an initial hash value, and generating an initial composite key according to the initial hash value and an equipment ID of the intelligent equipment;
[0017] generating a value according to a start mode of the intelligent equipment and an entry time of the initial fingerprint data; and
[0018] correspondingly writing the initial composite key and the value in the private blockchain through the addition function of the smart contract.
[0019] Further, the user input data is fingerprint data of the user, and the step of generating corresponding information to be enquired for the user input data, and invoking a query function of the smart contract to enquire the information to be enquired in the private blockchain includes:
[0020] converting, by the intelligent equipment, the fingerprint data to a hash value, and generating a composite key according to the hash value and the equipment ID of the intelligent equipment; and
[0021] invoking the query function of the smart contract to enquire whether there is a value that corresponds to the composite key in the private blockchain, and receiving a query result returned by the smart contract; wherein
[0022] the query result is employed to indicate whether the intelligent equipment is allowed to Date Recue/Date Received 2022-05-09 be used and operated.
[0023] Moreover, the method further comprises:
[0024] obtaining, when a client end receives an equipment initialization request of the intelligent equipment of the user, by the client end, an initial password set by the user, and employing a preset algorithm to generate corresponding second initial information for the initial password;
[0025] correspondingly writing the equipment ID of the intelligent equipment, the second initial information and the preset algorithm in a verification function of the smart contract, to update the smart contract; and
[0026] upgrading, by the various intelligent equipments, the smart contract according to a confirmation operation of the user.
[0027] Further, after the step of upgrading, by the various intelligent equipments, the smart contract according to a confirmation operation of the user, the method further comprises:
[0028] obtaining, by the intelligent equipment, an input password of the user, when the intelligent equipment receives the equipment use request from the user;
[0029] invoking the verification function of the smart contract to employ the preset algorithm to generate corresponding information for the input password, and performing comparative verification of the information with the second initial information that corresponds to the equipment ID of the intelligent equipment; and
[0030] receiving a verification result returned by the smart contract, and determining whether a use operation is allowed according to the verification result.
[0031] Further, the preset algorithm is a hash algorithm.
[0032] Moreover, the method further comprises:
[0033] invoking, when the intelligent equipment receives a modification request of the user sensitive data from the user, a modification function of the smart contract to modify the Date Recue/Date Received 2022-05-09 user sensitive data; and
[0034] invoking, when the intelligent equipment receives a deletion request of the user sensitive data from the user, a deletion function of the smart contract to delete the user sensitive data.
[0035] According to the second aspect, there is provided a method of controlling an intelligent equipment, the method is applied to an intelligent equipment in a private blockchain network, the private blockchain network consists of the intelligent equipment and other intelligent equipments, the private blockchain network is deployed with a smart contract released by a user, and the method comprises:
[0036] obtaining, by the intelligent equipment, user input data in an equipment use request, when the intelligent equipment receives the equipment use request from the user;
[0037] generating corresponding information to be enquired for the user input data, and invoking the smart contract to enquire the information to be enquired in a private blockchain, wherein initial information generated on the basis of user sensitive data is prestored in the private blockchain; and
[0038] determining whether a use operation is allowed according to a query result of the smart contract.
[0039] According to the third aspect, there is provided a method of controlling an intelligent equipment, the method is applied to an intelligent equipment in a private blockchain network, the private blockchain network consists of the intelligent equipment and other intelligent equipments, the private blockchain network is deployed with a smart contract released by a user, and the method comprises:
[0040] obtaining, by the intelligent equipment, an input password of the user, when the intelligent equipment receives an equipment use request from the user;
[0041] invoking the smart contract to enable the smart contract to employ a preset algorithm to generate corresponding information for the input password, and performing comparative verification of the information with initial information that corresponds to an equipment Date Recue/Date Received 2022-05-09 ID of the intelligent equipment, wherein the initial information is generated on the basis of an initial password set by the user; and
[0042] receiving a verification result returned by the smart contract, and determining whether a use operation is allowed according to the verification result.
[0043] According to the fourth aspect, there is provided an intelligent equipment system, the system comprises a client end and a plurality of intelligent equipments accessed to a local area network, the plural intelligent equipments constitute a private blockchain network,
[0044] the various intelligent equipments each include:
[0045] a contract obtaining module, for obtaining, respectively with other intelligent equipments in the private blockchain network, a smart contract having a plurality of functions released by a user through the client end;
[0046] a contract deploying module, for deploying the smart contract onto the private blockchain network after confirmation by the user;
[0047] a data obtaining module, for obtaining user sensitive data in an equipment initialization request, when the equipment initialization request is received from the user;
[0048] a first generating module, for generating corresponding first initial information for the user sensitive data; and
[0049] a contract invoking module, for invoking an addition function of the smart contract to write the first initial information in a private blockchain.
[0050] Further, the data obtaining module is further employed for obtaining user input data in an equipment use request, when the equipment use request is received from the user;
[0051] the first generating module is further employed for generating corresponding information to be enquired for the user input data;
[0052] the contract invoking module is further employed for invoking a query function of the smart contract to enquire the information to be enquired in the private blockchain;
[0053] the various intelligent equipments each further include:
[0054] an operation controlling module, for determining whether the intelligent equipment is Date Recue/Date Received 2022-05-09 allowed to be used and operated according to a query result of the smart contract.
[0055] Further, the user sensitive data is initial fingerprint data input by the user, and the first generating module is specifically employed for:
[0056] converting the initial fingerprint data to an initial hash value, and generating an initial composite key according to the initial hash value and an equipment ID of the intelligent equipment; and
[0057] generating a value according to a start mode of the intelligent equipment and an entry time of the initial fingerprint data;
[0058] the contract invoking module is specifically employed for:
[0059] correspondingly writing the initial composite key and the value in the private blockchain through the addition function of the smart contract.
[0060] Further, the user input data is fingerprint data of the user, and the first generating module is specifically further employed for:
[0061] converting the fingerprint data to a hash value, and generating a composite key according to the hash value and the equipment ID of the intelligent equipment;
[0062] the contract invoking module is specifically further employed for:
[0063] invoking the query function of the smart contract to enquire whether there is a value that corresponds to the composite key in the private blockchain, and receiving a query result returned by the smart contract; wherein
[0064] the query result is employed to indicate whether the intelligent equipment is allowed to be used and operated.
[0065] Moreover, the system further comprises a client end, and the client end includes:
[0066] a password obtaining module, for obtaining, when an equipment initialization request of the intelligent equipment is received from the user, by the client end, an initial password set by the user;
[0067] a second generating module, for employing a preset algorithm to generate corresponding Date Recue/Date Received 2022-05-09 second initial information for the initial password; and
[0068] an information writing module, for correspondingly writing the equipment ID of the intelligent equipment, the second initial information and the preset algorithm in a verification function of the smart contract, to update the smart contract;
[0069] the various intelligent equipments each further include:
[0070] a contract upgrading module, for upgrading the smart contract according to a confirmation operation of the user.
[0071] Further, the data obtaining module is specifically further employed for:
[0072] obtaining an input password of the user, when the equipment use request is received from the user;
[0073] the contract invoking module is specifically further employed for:
[0074] invoking the verification function of the smart contract to enable the smart contract to employ the preset algorithm to generate corresponding information for the input password, and performing comparative verification of the information with the second initial information that corresponds to the equipment ID of the intelligent equipment;
and
and
[0075] receiving a verification result returned by the smart contract, and determining whether a use operation is allowed according to the verification result.
[0076] Further, the preset algorithm is a hash algorithm.
[0077] Moreover, the contract invoking module is specifically further employed for:
[0078] invoking, when a modification request of the user sensitive data is received from the user, a modification function of the smart contract to modify the user sensitive data; and
[0079] invoking, when a deletion request of the user sensitive data is received from the user, a deletion function of the smart contract to delete the user sensitive data.
[0080] The technical solutions provided by the embodiments of the present invention bring about the following advantageous effects.
Date Recue/Date Received 2022-05-09
Date Recue/Date Received 2022-05-09
[0081] 1. Since the initial information generated by the user sensitive data is written in the private blockchain through the smart contract, and the content of the smart contract cannot be modified when a single intelligent equipment is broken through, the originally deployed smart contract can be evaded only by breaking through the entire intelligent equipments in the private blockchain network to deploy a new smart contract, so it is difficult for illegal individuals to obtain the user sensitive data, and the user sensitive data is rendered more secure.
[0082] 2. Since the user sensitive data according to the embodiments of the present invention is stored in an LAN private blockchain, the user sensitive data is prevented from being leaked, and it is made difficult for illegal individuals to obtain the user sensitive data; at the same time, the user sensitive data can only be operated and read by the user, the prior-art problem concerning security in which the user sensitive data is stored in the cloud server or locally is therefore avoided.
[0083] 3. Since the plural intelligent equipments constituting the private blockchain network are accessed to the local area network, malicious attack by illegal individuals through the public network is made impossible.
[0084] 4. Compared with prior-art technology in which the user must pass through the public network to access to the server for identification verification when the user sensitive data is stored in a cloud server, since the user sensitive data is stored in an LAN
private blockchain according to the embodiments of the present invention, the user can directly access to the LAN for identification verification, so the ID verification is made more highly effective.
Date Recue/Date Received 2022-05-09 BRIEF DESCRIPTION OF THE DRAWINGS
private blockchain according to the embodiments of the present invention, the user can directly access to the LAN for identification verification, so the ID verification is made more highly effective.
Date Recue/Date Received 2022-05-09 BRIEF DESCRIPTION OF THE DRAWINGS
[0085] In order to describe the technical solutions in the embodiments of the present invention more clearly, accompanying drawings required for use in the description of the embodiments will be briefly introduced below. Apparently, the accompanying drawings introduced below are merely directed to partial embodiments of the present invention, and it is possible for persons ordinarily skilled in the art to acquire other drawings based on these drawings without spending any creative effort in the process.
[0086] Fig. 1 is a flowchart illustrating a method of realizing an intelligent equipment system provided by the present invention;
[0087] Fig. 2 is a flowchart illustrating a method of realizing an intelligent equipment system provided by the present invention;
[0088] Fig. 3 is a flowchart illustrating a method of realizing an intelligent equipment system provided by the present invention;
[0089] Fig. 4 is a flowchart illustrating a method of realizing an intelligent equipment system provided by the present invention;
[0090] Fig. 5 is a view schematically illustrating the framework of an intelligent equipment system provided by the present invention;
[0091] Fig. 6 is a flowchart schematically illustrating password door-opening of a smart lock provided by the present invention; and
[0092] Fig. 7 is a system block diagram illustrating an intelligent equipment system provided by the present invention.
Date Recue/Date Received 2022-05-09 DETAILED DESCRIPTION OF THE INVENTION
Date Recue/Date Received 2022-05-09 DETAILED DESCRIPTION OF THE INVENTION
[0093] In order to make more lucid and clear the objectives, technical solutions, and advantages of the present invention, the technical solutions in the embodiments of the present invention will be clearly and comprehensively described below with reference to accompanying drawings in the embodiments of the present invention. Apparently, the embodiments as described are merely partial, rather than the entire, embodiments of the present invention. All other embodiments obtainable by persons ordinarily skilled in the art based on the embodiments in the present invention shall all be covered by the protection scope of the present invention.
[0094] As should be understood, such terms as "first" and "second" as used in the description of the present application are merely meant for descriptive purposes, and shall not be understood to indicate or imply relative importance. In addition, unless otherwise specified, such terms as "plural" and "plurality of' as used in the description of the present application mean "two or more".
[0095] Before the method of realizing an intelligent equipment system provided by the present invention is described, technical terms involved in the various embodiments of the present invention are firstly introduced as follows.
[0096] As regards "blockchain", it is a novel application pattern that merges together such computer techniques as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. In accordance with different degrees of centralization of the blockchain network, three types of blockchains are differentiated under different application scenarios:
[0097] 1. a blockchain that is public over the entire network, without any user authorization mechanism, is referred to as a public blockchain;
Date Recue/Date Received 2022-05-09
Date Recue/Date Received 2022-05-09
[0098] 2. a blockchain that allows access of authorized nodes to the networks, in which information can be viewed according to permission, and which is usually used among institutions, is referred to as an alliance chain;
[0099] 3. a blockchain in whose entire networks the nodes are all under control by one institution is referred to as a private blockchain.
[0100] Embodiment 1
[0101] Fig. 1 is a flowchart illustrating a method of realizing an intelligent equipment system provided by the present invention, as shown in Fig. 1, the method can comprise the following steps.
[0102] 101 - constituting a private blockchain network out of a plurality of intelligent equipments accessed to a local area network.
[0103] The plural intelligent equipments include, but are not limited to, smart locks, smart speakers, intelligent air-conditioners, intelligent television sets, and intelligent routers, etc. The intelligent equipment can utilize a sensor to collect such information as user fingerprint data and environmental data, etc., and the sensor can be either integrated on the intelligent equipment or connected with the intelligent equipment via a wired mode or a wireless mode.
[0104] 102 - obtaining, by each of the intelligent equipments, a smart contract having a plurality of functions released by a user, and deploying the smart contract onto the private blockchain network after confirmation by the user.
[0105] The smart contract possesses plural functions, including addition function, deletion function, query function, modification function, and verification function.
Date Recue/Date Received 2022-05-09
Date Recue/Date Received 2022-05-09
[0106] Specifically, the process can include the following:
[0107] The various intelligent equipments respectively obtain the smart contract released by the user through one of the following modes:
[0108] a client end having a contract releasing function;
[0109] an intelligent equipment from the plural intelligent equipments having a contract releasing function;
[0110] the client end can specifically be such a terminal equipment as a mobile terminal, a personal PC, etc.
[0111] After confirmation of the user by pressing a button, the various intelligent equipments deploy the smart contract onto the private blockchain network.
[0112] 103 - obtaining, by the intelligent equipment, user sensitive data in an equipment initialization request, when the intelligent equipment receives the equipment initialization request from the user.
[0113] The user sensitive data can be such user characteristic information as fingerprint data and iris data of the user, and other sensitive data can be further included.
[0114] In this embodiment, after the user has deployed the plural intelligent equipments to constitute the private blockchain network, it is required to initialize the intelligent equipments to facilitate subsequent use of the intelligent equipments. When it is required for the user to initialize an intelligent equipment, initialization can be performed by fingerprint input, taking a smart lock for example, the user can input his fingerprint data via a sensor in the smart lock, so as to initialize the smart lock.
[0115] 104 - generating corresponding first initial information for the user sensitive data, and invoking an addition function of the smart contract to write the first initial information in a private blockchain.
Date Recue/Date Received 2022-05-09
Date Recue/Date Received 2022-05-09
[0116] Specifically, the intelligent equipment converts the initial fingerprint data to an initial hash value, and generates an initial composite key according to the initial hash value and an equipment ID of the intelligent equipment; a value is generated according to a start mode of the intelligent equipment and an entry time of the initial fingerprint data; the initial composite key and the value are correspondingly written in a private blockchain through the addition function of the smart contract.
[0117] During the process of specific implementation, the intelligent equipment can employ a hash algorithm to perform hash computation on the initial fingerprint data, and to generate the initial hash value, and the hash algorithm can be any safe and reliable hash algorithm, such as 5HA256, 5M3 according to State Cryptography Administration or 5M4 according to State Cryptography Administration, etc.
[0118] In this embodiment of the present invention, since the initial information generated by the user sensitive data is written in the private blockchain through the smart contract, and the content of the smart contract cannot be modified when a single intelligent equipment is broken through, the originally deployed smart contract can be evaded only by breaking through the entire intelligent equipments in the private blockchain network to deploy a new smart contract, so it is difficult for illegal individuals to obtain the user sensitive data;
moreover, the user sensitive data can only be operated and read by the user, so the user sensitive data is rendered more secure; at the same time, since the plural intelligent equipments constituting the private blockchain network are accessed to the local area network, malicious attack by illegal individuals through the public network is made impossible; in addition, compared with prior-art technology in which the user must pass through the public network to access to the server for identification verification when the user sensitive data is stored in a cloud server, since the user sensitive data is stored in an LAN private blockchain according to the embodiments of the present invention, the user can directly access to the LAN for identification verification, so the ID
verification is Date Recue/Date Received 2022-05-09 made more highly effective.
moreover, the user sensitive data can only be operated and read by the user, so the user sensitive data is rendered more secure; at the same time, since the plural intelligent equipments constituting the private blockchain network are accessed to the local area network, malicious attack by illegal individuals through the public network is made impossible; in addition, compared with prior-art technology in which the user must pass through the public network to access to the server for identification verification when the user sensitive data is stored in a cloud server, since the user sensitive data is stored in an LAN private blockchain according to the embodiments of the present invention, the user can directly access to the LAN for identification verification, so the ID
verification is Date Recue/Date Received 2022-05-09 made more highly effective.
[0119] Moreover, the method provided by this embodiment of the present invention can further comprise:
[0120] invoking, when the intelligent equipment receives a modification request of the user sensitive data from the user, a modification function of the smart contract to modify the user sensitive data; and invoking, when the intelligent equipment receives a deletion request of the user sensitive data from the user, a deletion function of the smart contract to delete the user sensitive data.
[0121] In this embodiment of the present invention, through the modification function or the deletion function of the smart contract, it is facilitated to modify or delete the user sensitive data.
[0122] Moreover, the method provided by this embodiment of the present invention can further comprise:
[0123] recording, by the intelligent equipment, operations on the user sensitive data in the private blockchain for the user's review and check.
[0124] In this embodiment of the present invention, by recording operations on the user sensitive data in the private blockchain, it is made possible to prevent the user sensitive data from being illegally enquired and tampered with, and hence to fully guarantee the privacy and safety of the user sensitive data.
[0125] Embodiment 2
[0126] Fig. 2 is a flowchart illustrating a method of realizing an intelligent equipment system provided by the present invention, in this embodiment, in addition to comprising the steps described with reference to Fig. 1, the method of realizing an intelligent equipment Date Recue/Date Received 2022-05-09 system further comprises steps 201 to 204; for the sake of brevity, the steps described with reference to Fig. 1 are omitted. As shown in Fig. 2, the method of realizing an intelligent equipment system further comprises the following.
[0127] 201 - obtaining, by the intelligent equipment, user input data in an equipment use request, when the intelligent equipment receives the equipment use request from the user.
[0128] In this embodiment, after the user has completed initialization of the intelligent equipment, the intelligent equipment can be correspondingly operated. Taking a smart lock for example, when it is required for the user to open the smart lock, the smart lock can be opened through fingerprint input, i.e., fingerprint data is input via a sensor in the smart lock.
[0129] 202 - generating corresponding information to be enquired for the user input data.
[0130] The user input data is fingerprint data of the user.
[0131] Specifically, the intelligent equipment converts the fingerprint data to a hash value, and generates a composite key according to the hash value and the equipment ID of the intelligent equipment to serve as the information to be enquired.
[0132] During the process of specific implementation, the intelligent equipment can employ a hash algorithm to perform hash computation on the user input data, and to generate the hash value, and the hash algorithm can be any safe and reliable hash algorithm, such as 5HA256, 5M3 according to State Cryptography Administration or 5M4 according to State Cryptography Administration, etc.
[0133] 203 - invoking a query function of the smart contract to enquire the information to be enquired in the private blockchain.
Date Recue/Date Received 2022-05-09
Date Recue/Date Received 2022-05-09
[0134] Specifically, the query function of the smart contract is invoked to enquire whether there is a value that corresponds to the composite key in the private blockchain, and a query result returned by the smart contract is received. The query result is employed to indicate whether the intelligent equipment can be used and operated.
[0135] 204 - determining, by the intelligent equipment, whether a use operation is allowed according to a query result of the smart contract.
[0136] When the query result expresses successful query, the intelligent equipment is allowed to be used and operated, when the query result expresses failed query, the intelligent equipment is not allowed to be used and operated.
[0137] In this embodiment of the present invention, when the user is using the intelligent equipment, input data of the user is obtained and corresponding information to be enquired is generated, and corresponding query is performed by invoking the query function of the smart contract, so as to determine whether the intelligent equipment is allowed to be used and operated according to the query result returned by the smart contract, whereby it is made possible to prevent the intelligent equipment from being controlled by illegal individuals.
[0138] Embodiment 3
[0139] Fig. 3 is a flowchart illustrating a method of realizing an intelligent equipment system provided by the present invention, in this embodiment, in addition to comprising the steps described with reference to Fig. 1, the method of realizing an intelligent equipment system further comprises steps 301 to 304; for the sake of brevity, the steps described with reference to Fig. 1 are omitted. As shown in Fig. 3, the method of realizing an intelligent equipment system further comprises the following.
Date Recue/Date Received 2022-05-09
Date Recue/Date Received 2022-05-09
[0140] 301 - obtaining, when a client end of the user receives an equipment initialization request of the intelligent equipment of the user, by the client end, an initial password set by the user.
[0141] In this embodiment, after the user has deployed the plural intelligent equipments to constitute the private blockchain network, it is required to initialize the intelligent equipments to facilitate subsequent use of the intelligent equipments. When it is required for the user to initialize an intelligent equipment, initialization of the intelligent equipment can be further performed by password input in addition to fingerprint input.
Taking a smart lock for example, the user can employ a handset client end to set the door-opening password of the smart lock, so as to initialize the smart lock.
Taking a smart lock for example, the user can employ a handset client end to set the door-opening password of the smart lock, so as to initialize the smart lock.
[0142] 302 - employing a preset algorithm to generate corresponding second initial information for the initial password.
[0143] The preset algorithm is a hash algorithm.
[0144] Specifically, the client end can employ a hash algorithm to perform hash computation on the initial password, and to generate an initial hash value, and the hash algorithm can be any safe and reliable hash algorithm, such as 5HA256, 5M3 according to State Cryptography Administration or 5M4 according to State Cryptography Administration, etc.
[0145] 303 - correspondingly writing the equipment ID of the intelligent equipment, the second initial information and the preset algorithm in a verification function of the smart contract, to update the smart contract.
[0146] 304 - upgrading, by the various intelligent equipments, the smart contract according to a Date Recue/Date Received 2022-05-09 confirmation operation of the user.
[0147] Specifically, after confirmation of the user by pressing a button, each intelligent equipment upgrades the smart contract.
[0148] In this embodiment of the present invention, since the second initial information generated by the initial password set by the user is written in the private blockchain through the smart contract, when it is required for the user to change the initial password, this can be achieved by upgrading the contract.
[0149] Embodiment 4
[0150] Fig. 4 is a flowchart illustrating a method of realizing an intelligent equipment system provided by the present invention, in this embodiment, in addition to comprising the steps described with reference to Fig. 3, the method of realizing an intelligent equipment system further comprises steps 401 to 403; for the sake of brevity, the steps described with reference to Fig. 3 are omitted. As shown in Fig. 4, the method of realizing an intelligent equipment system further comprises the following.
[0151] 401 - obtaining, by the intelligent equipment, an input password of the user, when the intelligent equipment receives the equipment use request from the user.
[0152] In this embodiment, after the user has completed initialization of the intelligent equipment, the intelligent equipment can be correspondingly operated. Taking a smart lock for example, when it is required for the user to open the smart lock, the smart lock can be opened through password input, i.e., the password is input via a mobile client end in the smart lock.
[0153] 402 - invoking the verification function of the smart contract to enable the smart contract Date Recue/Date Received 2022-05-09 to employ the preset algorithm to generate corresponding information for the input password, and performing comparative verification of the information with the second initial information that corresponds to the equipment ID of the intelligent equipment.
[0154] Specifically, the intelligent equipment invokes the verification function of the smart contract to perform hash computation on the input password through the smart contract, performs a comparative verification of the hash computation result with the hash computation result of the initial password of the smart contract, and generates a verification result; the verification result is used to indicate whether the intelligent equipment is allowed to be used and operated.
[0155] 403 - receiving a verification result returned by the smart contract, and determining whether a use operation is allowed according to the verification result.
[0156] The verification result is used to indicate whether the intelligent equipment is allowed to be used and operated.
[0157] When the verification result expresses successful verification, the intelligent equipment is allowed to be used and operated, when the verification result expresses failed verification, the intelligent equipment is not allowed to be used and operated.
[0158] In this embodiment of the present invention, when the user is using the intelligent equipment, the input password of the user is obtained, and corresponding verification is made by invoking the verification function of the smart contract, so that it is determined according to the verification result returned by the smart contract as to whether the intelligent equipment is allowed to be used and operated, so as to prevent the intelligent equipment from being controlled by illegal individuals.
[0159] Embodiment 5 Date Recue/Date Received 2022-05-09
[0160] This embodiment of the present invention provides a method of controlling an intelligent equipment, the method is applied to an intelligent equipment in a private blockchain network, the private blockchain network consists of the intelligent equipment and other intelligent equipments, the private blockchain network is deployed with a smart contract released by a user, and the method comprises the following steps.
[0161] 501 - obtaining, by the intelligent equipment, user input data in an equipment use request, when the intelligent equipment receives the equipment use request from the user.
[0162] Specifically, this step is identical with step 201, so it is not redundantly described in this context.
[0163] 502 - generating corresponding information to be enquired for the user input data.
[0164] Specifically, this step is identical with step 202, so it is not redundantly described in this context.
[0165] 503 - invoking the smart contract to enquire the information to be enquired in a private blockchain, wherein initial information generated on the basis of user sensitive data is prestored in the private blockchain.
[0166] Specifically, this step is identical with step 203, so it is not redundantly described in this context.
[0167] 504 - determining whether a use operation is allowed according to a query result of the smart contract.
[0168] Specifically, this step is identical with step 204, so it is not redundantly described in this Date Recue/Date Received 2022-05-09 context.
[0169] In this embodiment of the present invention, when the user is using the intelligent equipment, input data of the user is obtained and corresponding information to be enquired is generated, and corresponding query is performed by invoking the smart contract, so as to determine whether the intelligent equipment is allowed to be used and operated according to the query result returned by the smart contract, whereby it is made possible to prevent the intelligent equipment from being controlled by illegal individuals.
[0170] Embodiment 6
[0171] This embodiment of the present invention provides a method of controlling an intelligent equipment, the method is applied to an intelligent equipment in a private blockchain network, the private blockchain network consists of the intelligent equipment and other intelligent equipments, the private blockchain network is deployed with a smart contract released by a user, and the method comprises the following steps.
[0172] 601 - obtaining, by the intelligent equipment, an input password of the user, when the intelligent equipment receives an equipment use request from the user.
[0173] Specifically, this step is identical with step 401, so it is not redundantly described in this context.
[0174] 602 - invoking the smart contract to enable the smart contract to employ a preset algorithm to generate corresponding information for the input password, and performing comparative verification of the information with initial information that corresponds to an equipment ID of the intelligent equipment, wherein the initial information is generated on the basis of an initial password set by the user.
Date Recue/Date Received 2022-05-09
Date Recue/Date Received 2022-05-09
[0175] Specifically, this step is identical with step 402, so it is not redundantly described in this context.
[0176] 603 - receiving a verification result returned by the smart contract, and determining whether a use operation is allowed according to the verification result.
[0177] Specifically, this step is identical with step 403, so it is not redundantly described in this context.
[0178] In this embodiment of the present invention, when the user is using the intelligent equipment, the input password of the user is obtained, and corresponding verification is made by invoking the smart contract, so that it is determined according to the verification result returned by the smart contract as to whether the intelligent equipment is allowed to be used and operated, so as to prevent the intelligent equipment from being controlled by illegal individuals.
[0179] The method provided by the embodiment of the present invention is exemplarily described below in conjunctions with Figs. 5 and 6. Suppose that the plural intelligent equipments accessed to the local area network include a smart lock, a smart speaker, an intelligent television set, and an intelligent router, after the method according to the embodiment of the present invention has been executed on these plural intelligent equipments, the framework of the resultant intelligent equipment system is as schematically shown with reference to Fig. 5. Suppose that the user uses a smart lock to open the door, as shown in Fig. 6, which is a flowchart schematically illustrating password door-opening of a smart lock provided by the present invention, the user inputs a password, the smart lock invokes the verification function of the smart contract to perform corresponding verification, and the smart lock allows the door-opening operation when the verification succeeds.
Date Recue/Date Received 2022-05-09
Date Recue/Date Received 2022-05-09
[0180] Embodiment 7
[0181] Fig. 7 is a system block diagram illustrating an intelligent equipment system provided by the present invention, the system can comprise a client end and a plurality of intelligent equipments accessed to a local area network, and the plural intelligent equipments constitute a private blockchain network, as shown in Fig. 7, to facilitate clear description, the intelligent equipment system that is based on blockchain is described below merely with a client end 710 and an intelligent equipment 720 that is located in the private blockchain network, of which the intelligent equipment 720 is configured as anyone of the plural intelligent equipments:
[0182] the client end 710 includes:
[0183] a contract releasing module 711, for releasing a smart contract having plural functions to various intelligent equipments of the private blockchain network;
[0184] the intelligent equipment 720 includes:
[0185] a contract obtaining module 721, for obtaining, respectively with other intelligent equipments in the private blockchain network, a smart contract having a plurality of functions released by a user;
[0186] a contract deploying module 722, for deploying the smart contract onto the private blockchain network after confirmation by the user;
[0187] a data obtaining module 723, for obtaining user sensitive data in an equipment initialization request, when the equipment initialization request is received from the user;
[0188] a first generating module 724, for generating corresponding first initial information for the user sensitive data; and
[0189] a contract invoking module 725, for invoking an addition function of the smart contract to write the first initial information in a private blockchain.
[0190] Moreover, the data obtaining module 723 is further employed for obtaining user input data in an equipment use request, when the equipment use request is received from the user;
Date Recue/Date Received 2022-05-09
Date Recue/Date Received 2022-05-09
[0191] the first generating module 724 is further employed for generating corresponding information to be enquired for the user input data;
[0192] the contract invoking module 725 is further employed for invoking a query function of the smart contract to enquire the information to be enquired in the private blockchain;
[0193] the intelligent equipment 720 further includes:
[0194] an operation controlling module 726, for determining whether the intelligent equipment is allowed to be used and operated according to a query result of the smart contract.
[0195] Further, the user sensitive data is initial fingerprint data input by the user, and the first generating module 724 is specifically employed for:
[0196] converting the initial fingerprint data to an initial hash value, and generating an initial composite key according to the initial hash value and an equipment ID of the intelligent equipment; and
[0197] generating a value according to a start mode of the intelligent equipment and an entry time of the initial fingerprint data;
[0198] the contract invoking module is specifically employed for:
[0199] correspondingly writing the initial composite key and the value in the private blockchain through the addition function of the smart contract.
[0200] Further, the user input data is fingerprint data of the user, and the first generating module 724 is specifically further employed for:
[0201] converting the fingerprint data to a hash value, and generating a composite key according to the hash value and the equipment ID of the intelligent equipment;
[0202] the contract invoking module 725 is specifically further employed for:
[0203] invoking the query function of the smart contract to enquire whether there is a value that corresponds to the composite key in the private blockchain, and receiving a query result returned by the smart contract; wherein
[0204] the query result is employed to indicate whether the intelligent equipment is allowed to be used and operated.
Date Recue/Date Received 2022-05-09
Date Recue/Date Received 2022-05-09
[0205] Moreover, the client end 710 further includes:
[0206] a password obtaining module 712, for obtaining, when an equipment initialization request of the intelligent equipment is received from the user, by the client end, an initial password set by the user;
[0207] a second generating module 713, for employing a preset algorithm to generate corresponding second initial information for the initial password; and
[0208] an information writing module 714, for correspondingly writing the equipment ID of the intelligent equipment, the second initial information and the preset algorithm in a verification function of the smart contract, to update the smart contract;
[0209] the intelligent equipment further includes:
[0210] a contract upgrading module 727, for upgrading the smart contract according to a confirmation operation of the user.
[0211] Further, the data obtaining module 723 is specifically further employed for:
[0212] obtaining an input password of the user, when the equipment use request is received from the user;
[0213] the contract invoking module 725 is specifically further employed for:
[0214] invoking the verification function of the smart contract to enable the smart contract to employ the preset algorithm to generate corresponding information for the input password, and performing comparative verification of the information with the second initial information that corresponds to the equipment ID of the intelligent equipment;
and
and
[0215] receiving a verification result returned by the smart contract, and determining whether a use operation is allowed according to the verification result.
[0216] Further, the preset algorithm is a hash algorithm.
[0217] Moreover, the contract invoking module 725 is specifically further employed for:
[0218] invoking, when a modification request of the user sensitive data is received from the user, Date Recue/Date Received 2022-05-09 a modification function of the smart contract to modify the user sensitive data; and
[0219] invoking, when a deletion request of the user sensitive data is received from the user, a deletion function of the smart contract to delete the user sensitive data.
[0220] As should be noted, the intelligent equipment system provided by the above embodiment is merely exemplarily described by being divided into the aforementioned various functional modules, whereas in practical application, it is possible to assign these functions to different functional modules to be completed there according to requirements, that is to say, the internal structure of the device can be divided into different functional modules to complete the entire or partial functions mentioned above. In addition, the intelligent equipment system pertains to the same conception as the method of realizing an intelligent equipment system and the methods of controlling an intelligent equipment ¨ see the method embodiments for details of its specific implementation process, while no repetition is made in this context.
[0221] As can be understood by persons ordinarily skilled in the art, the entire or partial steps that realize the aforementioned embodiments can be completed via hardware, and can also be completed via a program that instructs relevant hardware, the program can be stored in a computer-readable storage medium, and the storage medium can be a read-only memory, a magnetic disk or an optical disk, etc.
[0222] What the above describes is merely directed to preferred embodiments of the present invention, and is not meant to restrict the present invention. Any modification, equivalent substitution, and improvement makeable within the spirit and principle of the present invention shall all be covered by the protection scope of the present invention.
Date Recue/Date Received 2022-05-09
Date Recue/Date Received 2022-05-09
Claims (12)
1. A method of realizing an intelligent equipment system, characterized in comprising:
constituting a private blockchain network out of a plurality of intelligent equipments accessed to a local area network;
obtaining, by each of the intelligent equipments, a smart contract having a plurality of functions released by a user, and deploying the smart contract onto the private blockchain network after confirmation by the user;
obtaining, by the intelligent equipment, user sensitive data in an equipment initialization request, when the intelligent equipment receives the equipment initialization request from the user; and generating corresponding first initial information for the user sensitive data, and invoking an addition function of the smart contract to write the first initial information in a private blockchain.
constituting a private blockchain network out of a plurality of intelligent equipments accessed to a local area network;
obtaining, by each of the intelligent equipments, a smart contract having a plurality of functions released by a user, and deploying the smart contract onto the private blockchain network after confirmation by the user;
obtaining, by the intelligent equipment, user sensitive data in an equipment initialization request, when the intelligent equipment receives the equipment initialization request from the user; and generating corresponding first initial information for the user sensitive data, and invoking an addition function of the smart contract to write the first initial information in a private blockchain.
2. The method according to Claim 1, characterized in that, after the step of invoking an addition function of the smart contract to write the information in a private blockchain, the method further comprises:
obtaining, by the intelligent equipment, user input data in an equipment use request, when the intelligent equipment receives the equipment use request from the user;
generating corresponding information to be enquired for the user input data, and invoking a query function of the smart contract to enquire the information to be enquired in the private blockchain;
and determining, by the intelligent equipment, whether a use operation is allowed according to a query result of the smart contract.
obtaining, by the intelligent equipment, user input data in an equipment use request, when the intelligent equipment receives the equipment use request from the user;
generating corresponding information to be enquired for the user input data, and invoking a query function of the smart contract to enquire the information to be enquired in the private blockchain;
and determining, by the intelligent equipment, whether a use operation is allowed according to a query result of the smart contract.
3. The method according to Claim 1 or 2, characterized in that the user sensitive data is initial fingerprint data input by the user, and that the step of generating corresponding first initial information for the user sensitive data, and invoking an addition function of the smart contract Date Recue/Date Received 2022-05-09 to write the first initial information in a private blockchain includes:
converting, by the intelligent equipment, the initial fingerprint data to an initial hash value, and generating an initial composite key according to the initial hash value and an equipment ID of the intelligent equipment;
generating a value according to a start mode of the intelligent equipment and an entry time of the initial fingerprint data; and correspondingly writing the initial composite key and the value in the private blockchain through the addition function of the smart contract.
converting, by the intelligent equipment, the initial fingerprint data to an initial hash value, and generating an initial composite key according to the initial hash value and an equipment ID of the intelligent equipment;
generating a value according to a start mode of the intelligent equipment and an entry time of the initial fingerprint data; and correspondingly writing the initial composite key and the value in the private blockchain through the addition function of the smart contract.
4. The method according to Claim 3, characterized in that the user input data is fingerprint data of the user, and that the step of generating corresponding information to be enquired for the user input data, and invoking a query function of the smart contract to enquire the information to be enquired in the private blockchain includes:
converting, by the intelligent equipment, the fingerprint data to a hash value, and generating a composite key according to the hash value and the equipment ID of the intelligent equipment;
and invoking the query function of the smart contract to enquire whether there is a value that corresponds to the composite key in the private blockchain, and receiving a query result returned by the smart contract; wherein the query result is employed to indicate whether the intelligent equipment is allowed to be used and operated.
converting, by the intelligent equipment, the fingerprint data to a hash value, and generating a composite key according to the hash value and the equipment ID of the intelligent equipment;
and invoking the query function of the smart contract to enquire whether there is a value that corresponds to the composite key in the private blockchain, and receiving a query result returned by the smart contract; wherein the query result is employed to indicate whether the intelligent equipment is allowed to be used and operated.
5. The method according to Claim 1, characterized in further comprising:
obtaining, when a client end of the user receives an equipment initialization request of the intelligent equipment of the user, by the client end, an initial password set by the user;
employing a preset algorithm to generate corresponding second initial information for the initial password;
correspondingly writing the equipment ID of the intelligent equipment, the second initial information and the preset algorithm in a verification function of the smart contract, to update Date Recue/Date Received 2022-05-09 the smart contract; and upgrading, by the various intelligent equipments, the smart contract according to a confirmation operation of the user.
obtaining, when a client end of the user receives an equipment initialization request of the intelligent equipment of the user, by the client end, an initial password set by the user;
employing a preset algorithm to generate corresponding second initial information for the initial password;
correspondingly writing the equipment ID of the intelligent equipment, the second initial information and the preset algorithm in a verification function of the smart contract, to update Date Recue/Date Received 2022-05-09 the smart contract; and upgrading, by the various intelligent equipments, the smart contract according to a confirmation operation of the user.
6. The method according to Claim 5, characterized in that, after the step of upgrading, by the various intelligent equipments, the smart contract according to a confirmation operation of the user, the method further comprises:
obtaining, by the intelligent equipment, an input password of the user, when the intelligent equipment receives the equipment use request from the user;
invoking the verification function of the smart contract to enable the smart contract to employ the preset algorithm to generate corresponding information for the input password, and performing comparative verification of the information with the second initial information that corresponds to the equipment ID of the intelligent equipment; and receiving a verification result returned by the smart contract, and determining whether a use operation is allowed according to the verification result.
obtaining, by the intelligent equipment, an input password of the user, when the intelligent equipment receives the equipment use request from the user;
invoking the verification function of the smart contract to enable the smart contract to employ the preset algorithm to generate corresponding information for the input password, and performing comparative verification of the information with the second initial information that corresponds to the equipment ID of the intelligent equipment; and receiving a verification result returned by the smart contract, and determining whether a use operation is allowed according to the verification result.
7. The method according to Claim 5 or 6, characterized in that the preset algorithm is a hash algorithm.
8. The method according to Claim 1, characterized in further comprising:
invoking, when the intelligent equipment receives a modification request of the user sensitive data from the user, a modification function of the smart contract to modify the user sensitive data;
and invoking, when the intelligent equipment receives a deletion request of the user sensitive data from the user, a deletion function of the smart contract to delete the user sensitive data.
invoking, when the intelligent equipment receives a modification request of the user sensitive data from the user, a modification function of the smart contract to modify the user sensitive data;
and invoking, when the intelligent equipment receives a deletion request of the user sensitive data from the user, a deletion function of the smart contract to delete the user sensitive data.
9. A method of controlling an intelligent equipment, characterized in that the method is applied to an intelligent equipment in a private blockchain network, that the private blockchain network consists of the intelligent equipment and other intelligent equipments, that the private blockchain Date Recue/Date Received 2022-05-09 network is deployed with a smart contract released by a user, and that the method comprises:
obtaining, by the intelligent equipment, user input data in an equipment use request, when the intelligent equipment receives the equipment use request from the user;
generating corresponding information to be enquired for the user input data, and invoking the smart contract to enquire the information to be enquired in a private blockchain, wherein initial information generated on the basis of user sensitive data is prestored in the private blockchain;
and determining whether a use operation is allowed according to a query result of the smart contract.
obtaining, by the intelligent equipment, user input data in an equipment use request, when the intelligent equipment receives the equipment use request from the user;
generating corresponding information to be enquired for the user input data, and invoking the smart contract to enquire the information to be enquired in a private blockchain, wherein initial information generated on the basis of user sensitive data is prestored in the private blockchain;
and determining whether a use operation is allowed according to a query result of the smart contract.
10. A method of controlling an intelligent equipment, characterized in that the method is applied to an intelligent equipment in a private blockchain network, that the private blockchain network consists of the intelligent equipment and other intelligent equipments, that the private blockchain network is deployed with a smart contract released by a user, and that the method comprises:
obtaining, by the intelligent equipment, an input password of the user, when the intelligent equipment receives an equipment use request from the user;
invoking the smart contract to enable the smart contract to employ a preset algorithm to generate corresponding information for the input password, and performing comparative verification of the information with initial information that corresponds to an equipment ID
of the intelligent equipment, wherein the initial information is generated on the basis of an initial password set by the user; and receiving a verification result returned by the smart contract, and determining whether a use operation is allowed according to the verification result.
obtaining, by the intelligent equipment, an input password of the user, when the intelligent equipment receives an equipment use request from the user;
invoking the smart contract to enable the smart contract to employ a preset algorithm to generate corresponding information for the input password, and performing comparative verification of the information with initial information that corresponds to an equipment ID
of the intelligent equipment, wherein the initial information is generated on the basis of an initial password set by the user; and receiving a verification result returned by the smart contract, and determining whether a use operation is allowed according to the verification result.
11. An intelligent equipment system, characterized in that the system comprises a plurality of intelligent equipments accessed to a local area network, that the plural intelligent equipments constitute a private blockchain network, and that the various intelligent equipments each include:
a contract obtaining module, for obtaining, respectively with other intelligent equipments in the private blockchain network, a smart contract having a plurality of functions released by a user;
Date Recue/Date Received 2022-05-09 a contract deploying module, for deploying the smart contract onto the private blockchain network after confirmation by the user;
a data obtaining module, for obtaining user sensitive data in an equipment initialization request, when the equipment initialization request is received from the user;
a first generating module, for generating corresponding first initial information for the user sensitive data; and a contract invoking module, for invoking an addition function of the smart contract to write the initial information in a private blockchain.
a contract obtaining module, for obtaining, respectively with other intelligent equipments in the private blockchain network, a smart contract having a plurality of functions released by a user;
Date Recue/Date Received 2022-05-09 a contract deploying module, for deploying the smart contract onto the private blockchain network after confirmation by the user;
a data obtaining module, for obtaining user sensitive data in an equipment initialization request, when the equipment initialization request is received from the user;
a first generating module, for generating corresponding first initial information for the user sensitive data; and a contract invoking module, for invoking an addition function of the smart contract to write the initial information in a private blockchain.
12. The system according to Claim 11, characterized in that:
the data obtaining module is further employed for obtaining user input data in an equipment use request, when the equipment use request is received from the user; that the first generating module is further employed for generating corresponding information to be enquired for the user input data; that the contract invoking module is further employed for invoking a query function of the smart contract to enquire the information to be enquired in the private blockchain;
and that the various intelligent equipments each further include:
an operation controlling module, for determining whether the intelligent equipment is allowed to be used and operated according to a query result of the smart contract.
Date Recue/Date Received 2022-05-09
the data obtaining module is further employed for obtaining user input data in an equipment use request, when the equipment use request is received from the user; that the first generating module is further employed for generating corresponding information to be enquired for the user input data; that the contract invoking module is further employed for invoking a query function of the smart contract to enquire the information to be enquired in the private blockchain;
and that the various intelligent equipments each further include:
an operation controlling module, for determining whether the intelligent equipment is allowed to be used and operated according to a query result of the smart contract.
Date Recue/Date Received 2022-05-09
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811359532.9A CN109660514B (en) | 2018-11-15 | 2018-11-15 | Implementation method of intelligent equipment system, intelligent equipment control method and system |
CN201811359532.9 | 2018-11-15 | ||
PCT/CN2019/106753 WO2020098382A1 (en) | 2018-11-15 | 2019-09-19 | Implementation method for smart device system, smart device control method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CA3160728A1 true CA3160728A1 (en) | 2020-05-22 |
Family
ID=66112020
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA3160728A Pending CA3160728A1 (en) | 2018-11-15 | 2019-09-19 | Method of realizing intelligent equipment system, method of controlling intelligent equipement, and system |
Country Status (3)
Country | Link |
---|---|
CN (1) | CN109660514B (en) |
CA (1) | CA3160728A1 (en) |
WO (1) | WO2020098382A1 (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109660514B (en) * | 2018-11-15 | 2020-06-09 | 苏宁易购集团股份有限公司 | Implementation method of intelligent equipment system, intelligent equipment control method and system |
CN110716745A (en) * | 2019-10-21 | 2020-01-21 | 星矿科技(北京)有限公司 | Method for constructing off-center community by using block chain and intelligent contract |
CN111046078B (en) * | 2019-11-11 | 2023-09-05 | 京东科技信息技术有限公司 | Credit investigation method and device based on block chain and electronic equipment |
CN112637274A (en) * | 2020-12-04 | 2021-04-09 | 山西特信环宇信息技术有限公司 | Cone block chain terminal and access method thereof |
CN113347185B (en) * | 2021-06-01 | 2023-04-18 | 佳乔(深圳)投资有限公司 | Internet of things equipment management method based on block chain |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107306183B (en) * | 2016-04-22 | 2021-12-21 | 索尼公司 | Client, server, method and identity verification system |
CN106796685A (en) * | 2016-12-30 | 2017-05-31 | 深圳前海达闼云端智能科技有限公司 | Block chain authority control method and device and node equipment |
CN107341702B (en) * | 2017-03-08 | 2020-06-23 | 创新先进技术有限公司 | Service processing method and device |
US20180315055A1 (en) * | 2017-05-01 | 2018-11-01 | International Business Machines Corporation | Blockchain For Issue/Defect Tracking System |
WO2019036831A1 (en) * | 2017-08-21 | 2019-02-28 | 达闼科技成都有限公司 | Information selection method, apparatus, electronic device and computer-readable storage medium |
CN107622385A (en) * | 2017-08-28 | 2018-01-23 | 南京邮电大学 | A kind of copyright distributing method based on block chain intelligence contract |
KR101881045B1 (en) * | 2017-11-15 | 2018-07-23 | 주식회사 가온시스템 | System and method for providing medical information based on block chain |
CN108460290A (en) * | 2017-12-27 | 2018-08-28 | 江苏省卫生统计信息中心 | A kind of Electronic Health Record management system and method |
CN108171430B (en) * | 2017-12-29 | 2021-12-07 | 深圳市轱辘车联数据技术有限公司 | Data processing method, vehicle-mounted equipment and UBI analysis center server |
CN108364180A (en) * | 2018-01-31 | 2018-08-03 | 复旦大学 | A kind of shared electricity transaction method based on block chain |
CN108494090B (en) * | 2018-04-16 | 2020-10-02 | 华东师范大学 | Energy networking intelligent device and system based on block chain |
CN108717861B (en) * | 2018-04-16 | 2020-07-14 | 上海交通大学 | Medical data sharing method based on block chain |
CN108647966A (en) * | 2018-05-09 | 2018-10-12 | 深圳市融讯科技有限公司 | A kind of data interactive method and device based on block chain |
CN109660514B (en) * | 2018-11-15 | 2020-06-09 | 苏宁易购集团股份有限公司 | Implementation method of intelligent equipment system, intelligent equipment control method and system |
-
2018
- 2018-11-15 CN CN201811359532.9A patent/CN109660514B/en active Active
-
2019
- 2019-09-19 WO PCT/CN2019/106753 patent/WO2020098382A1/en active Application Filing
- 2019-09-19 CA CA3160728A patent/CA3160728A1/en active Pending
Also Published As
Publication number | Publication date |
---|---|
WO2020098382A1 (en) | 2020-05-22 |
CN109660514B (en) | 2020-06-09 |
CN109660514A (en) | 2019-04-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA3160728A1 (en) | Method of realizing intelligent equipment system, method of controlling intelligent equipement, and system | |
US9330513B2 (en) | Resource management based on biometric data | |
US11556617B2 (en) | Authentication translation | |
US7987357B2 (en) | Disabling remote logins without passwords | |
KR20160097323A (en) | Near field communication authentication mechanism | |
WO2013107362A1 (en) | Method and system for protecting data | |
US20220245631A1 (en) | Authentication method and apparatus of biometric payment device, computer device, and storage medium | |
Rahim et al. | Sensor based PUF IoT authentication model for a smart home with private blockchain | |
EP3794485B1 (en) | Method and network node for managing access to a blockchain | |
US20200218819A1 (en) | Sfs access control method and system, sfs and terminal device | |
CN116192483A (en) | Authentication method, device, equipment and medium | |
US20240048562A1 (en) | Sponsor delegation for multi-factor authentication | |
JP2020521341A (en) | Cryptographic key management based on identification information | |
WO2020159328A1 (en) | Authentication information processing method and apparatus and user terminal including authentication information processing method apparatus | |
US20090327704A1 (en) | Strong authentication to a network | |
US20220394042A1 (en) | Protecting physical locations with continuous multi-factor authentication systems | |
JP2004206258A (en) | Multiple authentication system, computer program, and multiple authentication method | |
CN111292444A (en) | Real estate as tradable digital assets via blockchain integration | |
CN111369710A (en) | Intelligent lock system supported by block chain | |
US11790115B1 (en) | Privacy preserving data processing in a Solid ecosystem using agents | |
US20230344830A1 (en) | Continuous multifactor authentication system integration with corporate security systems | |
Angelogianni | Analysis and Implementation of the Fido Protocol in a Trusted Environment | |
US10757097B2 (en) | Temporal identity vaulting | |
Tank et al. | Security analysis of OpenStack keystone | |
KR20230089559A (en) | Blockchain-based fido authentication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request |
Effective date: 20220916 |
|
EEER | Examination request |
Effective date: 20220916 |
|
EEER | Examination request |
Effective date: 20220916 |
|
EEER | Examination request |
Effective date: 20220916 |
|
EEER | Examination request |
Effective date: 20220916 |