CA3160728A1 - Method of realizing intelligent equipment system, method of controlling intelligent equipement, and system - Google Patents

Method of realizing intelligent equipment system, method of controlling intelligent equipement, and system

Info

Publication number
CA3160728A1
CA3160728A1 CA3160728A CA3160728A CA3160728A1 CA 3160728 A1 CA3160728 A1 CA 3160728A1 CA 3160728 A CA3160728 A CA 3160728A CA 3160728 A CA3160728 A CA 3160728A CA 3160728 A1 CA3160728 A1 CA 3160728A1
Authority
CA
Canada
Prior art keywords
user
smart contract
equipment
intelligent equipment
intelligent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CA3160728A
Other languages
French (fr)
Inventor
Lei Yao
Ping YAO
Rui Li
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
10353744 Canada Ltd
Original Assignee
10353744 Canada Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 10353744 Canada Ltd filed Critical 10353744 Canada Ltd
Publication of CA3160728A1 publication Critical patent/CA3160728A1/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The present invention belongs to the technical field of block chain technology, and disclosed thereby are an an implementation method for a smart device system, a smart device control method and system. The method comprises: forming a private chain network for a plurality of smart devices connected to a local area network; each smart device respectively obtaining a smart contract having a plurality of functions which is issued by a user, and deploying the smart contract to the private chain network after being authenticated by users; when a smart device receives an initialization request of a user, the smart device obtaining user sensitive data in the device initialization request and generating corresponding first initial information for the user sensitive data; and calling an adding function of the smart contract to write the first initial information into the private chain. According to the embodiments of the present invention, the user sensitive data acquired by the smart device is stored on the private chain by means of the smart contract, which can avoid the leakage of user sensitive data and fully guarantee the privacy and security of the user sensitive data.

Description

METHOD OF REALIZING INTELLIGENT EQUIPMENT SYSTEM, METHOD OF
CONTROLLING INTELLIGENT EQUIPMENT, AND SYSTEM
BACKGROUND OF THE INVENTION
Technical Field [0001] The present invention relates to the field of blockchain technology, and more particularly to a method of realizing an intelligent equipment system, methods of controlling an intelligent equipment, and a corresponding system.
Description of Related Art
[0002] The intelligent equipment is any of an equipment, apparatus or machine having computing and processing capabilities. With the increasing development of science, more and more intelligent equipments appear in the everyday life of people, such as smart locks, smart speakers, intelligent air-conditioners, intelligent television sets, and intelligent routers, etc., these intelligent equipments are accessed to the network via the WiFi of household routers, and are subsequently controlled by application programs of mobile phones.
[0003] As the inventor has found in the process of implementing the present invention, the data are currently available intelligent equipments are mostly stored in the cloud servers of manufacturers, and then controlled via handset terminals, but this practice tends to cause leakage of personal information, and it is also made possible at the same time for illegal individuals to take advantage of loopholes to tamper with the data, so as to achieve the objective of controlling the intelligent equipments.

Date Recue/Date Received 2022-05-09 SUMMARY OF THE INVENTION
[0004] An objective of the present invention it is to provide a method of realizing an intelligent equipment system, methods of controlling an intelligent equipment, and a corresponding system, whereby user sensitive data in the intelligent equipment is stored on a private blockchain through a smart contract, and it is made possible to avoid leakage of the user sensitive data, and to fully guarantee privacy and safety of the user sensitive data.
[0005] Specific technical solutions provided by the embodiments of the present invention are as follows.
[0006] According to the first aspect, there is provided a method of realizing an intelligent equipment system, and the method comprises:
[0007] constituting a private blockchain network out of a plurality of intelligent equipments accessed to a local area network;
[0008] obtaining, by each of the intelligent equipments, a smart contract having a plurality of functions released by a user, and deploying the smart contract onto the private blockchain network after confirmation by the user;
[0009] obtaining, by the intelligent equipment, user sensitive data in an equipment initialization request, when the intelligent equipment receives the equipment initialization request from the user; and
[0010] generating corresponding first initial information for the user sensitive data, and invoking an addition function of the smart contract to write the first initial information in a private blockchain.
[0011] Further, after the step of invoking an addition function of the smart contract to write the information in a private blockchain, the method further comprises:
[0012] obtaining, by the intelligent equipment, user input data in an equipment use request, when the intelligent equipment receives the equipment use request from the user, and Date Recue/Date Received 2022-05-09 generating corresponding information to be enquired for the user input data;
[0013] invoking a query function of the smart contract to enquire the information to be enquired in the private blockchain; and
[0014] determining, by the intelligent equipment, whether a use operation is allowed according to a query result of the smart contract.
[0015] Further, the user sensitive data is initial fingerprint data input by the user, and the step of generating corresponding first initial information for the user sensitive data, and invoking an addition function of the smart contract to write the first initial information in a private blockchain includes:
[0016] converting, by the intelligent equipment, the initial fingerprint data to an initial hash value, and generating an initial composite key according to the initial hash value and an equipment ID of the intelligent equipment;
[0017] generating a value according to a start mode of the intelligent equipment and an entry time of the initial fingerprint data; and
[0018] correspondingly writing the initial composite key and the value in the private blockchain through the addition function of the smart contract.
[0019] Further, the user input data is fingerprint data of the user, and the step of generating corresponding information to be enquired for the user input data, and invoking a query function of the smart contract to enquire the information to be enquired in the private blockchain includes:
[0020] converting, by the intelligent equipment, the fingerprint data to a hash value, and generating a composite key according to the hash value and the equipment ID of the intelligent equipment; and
[0021] invoking the query function of the smart contract to enquire whether there is a value that corresponds to the composite key in the private blockchain, and receiving a query result returned by the smart contract; wherein
[0022] the query result is employed to indicate whether the intelligent equipment is allowed to Date Recue/Date Received 2022-05-09 be used and operated.
[0023] Moreover, the method further comprises:
[0024] obtaining, when a client end receives an equipment initialization request of the intelligent equipment of the user, by the client end, an initial password set by the user, and employing a preset algorithm to generate corresponding second initial information for the initial password;
[0025] correspondingly writing the equipment ID of the intelligent equipment, the second initial information and the preset algorithm in a verification function of the smart contract, to update the smart contract; and
[0026] upgrading, by the various intelligent equipments, the smart contract according to a confirmation operation of the user.
[0027] Further, after the step of upgrading, by the various intelligent equipments, the smart contract according to a confirmation operation of the user, the method further comprises:
[0028] obtaining, by the intelligent equipment, an input password of the user, when the intelligent equipment receives the equipment use request from the user;
[0029] invoking the verification function of the smart contract to employ the preset algorithm to generate corresponding information for the input password, and performing comparative verification of the information with the second initial information that corresponds to the equipment ID of the intelligent equipment; and
[0030] receiving a verification result returned by the smart contract, and determining whether a use operation is allowed according to the verification result.
[0031] Further, the preset algorithm is a hash algorithm.
[0032] Moreover, the method further comprises:
[0033] invoking, when the intelligent equipment receives a modification request of the user sensitive data from the user, a modification function of the smart contract to modify the Date Recue/Date Received 2022-05-09 user sensitive data; and
[0034] invoking, when the intelligent equipment receives a deletion request of the user sensitive data from the user, a deletion function of the smart contract to delete the user sensitive data.
[0035] According to the second aspect, there is provided a method of controlling an intelligent equipment, the method is applied to an intelligent equipment in a private blockchain network, the private blockchain network consists of the intelligent equipment and other intelligent equipments, the private blockchain network is deployed with a smart contract released by a user, and the method comprises:
[0036] obtaining, by the intelligent equipment, user input data in an equipment use request, when the intelligent equipment receives the equipment use request from the user;
[0037] generating corresponding information to be enquired for the user input data, and invoking the smart contract to enquire the information to be enquired in a private blockchain, wherein initial information generated on the basis of user sensitive data is prestored in the private blockchain; and
[0038] determining whether a use operation is allowed according to a query result of the smart contract.
[0039] According to the third aspect, there is provided a method of controlling an intelligent equipment, the method is applied to an intelligent equipment in a private blockchain network, the private blockchain network consists of the intelligent equipment and other intelligent equipments, the private blockchain network is deployed with a smart contract released by a user, and the method comprises:
[0040] obtaining, by the intelligent equipment, an input password of the user, when the intelligent equipment receives an equipment use request from the user;
[0041] invoking the smart contract to enable the smart contract to employ a preset algorithm to generate corresponding information for the input password, and performing comparative verification of the information with initial information that corresponds to an equipment Date Recue/Date Received 2022-05-09 ID of the intelligent equipment, wherein the initial information is generated on the basis of an initial password set by the user; and
[0042] receiving a verification result returned by the smart contract, and determining whether a use operation is allowed according to the verification result.
[0043] According to the fourth aspect, there is provided an intelligent equipment system, the system comprises a client end and a plurality of intelligent equipments accessed to a local area network, the plural intelligent equipments constitute a private blockchain network,
[0044] the various intelligent equipments each include:
[0045] a contract obtaining module, for obtaining, respectively with other intelligent equipments in the private blockchain network, a smart contract having a plurality of functions released by a user through the client end;
[0046] a contract deploying module, for deploying the smart contract onto the private blockchain network after confirmation by the user;
[0047] a data obtaining module, for obtaining user sensitive data in an equipment initialization request, when the equipment initialization request is received from the user;
[0048] a first generating module, for generating corresponding first initial information for the user sensitive data; and
[0049] a contract invoking module, for invoking an addition function of the smart contract to write the first initial information in a private blockchain.
[0050] Further, the data obtaining module is further employed for obtaining user input data in an equipment use request, when the equipment use request is received from the user;
[0051] the first generating module is further employed for generating corresponding information to be enquired for the user input data;
[0052] the contract invoking module is further employed for invoking a query function of the smart contract to enquire the information to be enquired in the private blockchain;
[0053] the various intelligent equipments each further include:
[0054] an operation controlling module, for determining whether the intelligent equipment is Date Recue/Date Received 2022-05-09 allowed to be used and operated according to a query result of the smart contract.
[0055] Further, the user sensitive data is initial fingerprint data input by the user, and the first generating module is specifically employed for:
[0056] converting the initial fingerprint data to an initial hash value, and generating an initial composite key according to the initial hash value and an equipment ID of the intelligent equipment; and
[0057] generating a value according to a start mode of the intelligent equipment and an entry time of the initial fingerprint data;
[0058] the contract invoking module is specifically employed for:
[0059] correspondingly writing the initial composite key and the value in the private blockchain through the addition function of the smart contract.
[0060] Further, the user input data is fingerprint data of the user, and the first generating module is specifically further employed for:
[0061] converting the fingerprint data to a hash value, and generating a composite key according to the hash value and the equipment ID of the intelligent equipment;
[0062] the contract invoking module is specifically further employed for:
[0063] invoking the query function of the smart contract to enquire whether there is a value that corresponds to the composite key in the private blockchain, and receiving a query result returned by the smart contract; wherein
[0064] the query result is employed to indicate whether the intelligent equipment is allowed to be used and operated.
[0065] Moreover, the system further comprises a client end, and the client end includes:
[0066] a password obtaining module, for obtaining, when an equipment initialization request of the intelligent equipment is received from the user, by the client end, an initial password set by the user;
[0067] a second generating module, for employing a preset algorithm to generate corresponding Date Recue/Date Received 2022-05-09 second initial information for the initial password; and
[0068] an information writing module, for correspondingly writing the equipment ID of the intelligent equipment, the second initial information and the preset algorithm in a verification function of the smart contract, to update the smart contract;
[0069] the various intelligent equipments each further include:
[0070] a contract upgrading module, for upgrading the smart contract according to a confirmation operation of the user.
[0071] Further, the data obtaining module is specifically further employed for:
[0072] obtaining an input password of the user, when the equipment use request is received from the user;
[0073] the contract invoking module is specifically further employed for:
[0074] invoking the verification function of the smart contract to enable the smart contract to employ the preset algorithm to generate corresponding information for the input password, and performing comparative verification of the information with the second initial information that corresponds to the equipment ID of the intelligent equipment;
and
[0075] receiving a verification result returned by the smart contract, and determining whether a use operation is allowed according to the verification result.
[0076] Further, the preset algorithm is a hash algorithm.
[0077] Moreover, the contract invoking module is specifically further employed for:
[0078] invoking, when a modification request of the user sensitive data is received from the user, a modification function of the smart contract to modify the user sensitive data; and
[0079] invoking, when a deletion request of the user sensitive data is received from the user, a deletion function of the smart contract to delete the user sensitive data.
[0080] The technical solutions provided by the embodiments of the present invention bring about the following advantageous effects.

Date Recue/Date Received 2022-05-09
[0081] 1. Since the initial information generated by the user sensitive data is written in the private blockchain through the smart contract, and the content of the smart contract cannot be modified when a single intelligent equipment is broken through, the originally deployed smart contract can be evaded only by breaking through the entire intelligent equipments in the private blockchain network to deploy a new smart contract, so it is difficult for illegal individuals to obtain the user sensitive data, and the user sensitive data is rendered more secure.
[0082] 2. Since the user sensitive data according to the embodiments of the present invention is stored in an LAN private blockchain, the user sensitive data is prevented from being leaked, and it is made difficult for illegal individuals to obtain the user sensitive data; at the same time, the user sensitive data can only be operated and read by the user, the prior-art problem concerning security in which the user sensitive data is stored in the cloud server or locally is therefore avoided.
[0083] 3. Since the plural intelligent equipments constituting the private blockchain network are accessed to the local area network, malicious attack by illegal individuals through the public network is made impossible.
[0084] 4. Compared with prior-art technology in which the user must pass through the public network to access to the server for identification verification when the user sensitive data is stored in a cloud server, since the user sensitive data is stored in an LAN
private blockchain according to the embodiments of the present invention, the user can directly access to the LAN for identification verification, so the ID verification is made more highly effective.

Date Recue/Date Received 2022-05-09 BRIEF DESCRIPTION OF THE DRAWINGS
[0085] In order to describe the technical solutions in the embodiments of the present invention more clearly, accompanying drawings required for use in the description of the embodiments will be briefly introduced below. Apparently, the accompanying drawings introduced below are merely directed to partial embodiments of the present invention, and it is possible for persons ordinarily skilled in the art to acquire other drawings based on these drawings without spending any creative effort in the process.
[0086] Fig. 1 is a flowchart illustrating a method of realizing an intelligent equipment system provided by the present invention;
[0087] Fig. 2 is a flowchart illustrating a method of realizing an intelligent equipment system provided by the present invention;
[0088] Fig. 3 is a flowchart illustrating a method of realizing an intelligent equipment system provided by the present invention;
[0089] Fig. 4 is a flowchart illustrating a method of realizing an intelligent equipment system provided by the present invention;
[0090] Fig. 5 is a view schematically illustrating the framework of an intelligent equipment system provided by the present invention;
[0091] Fig. 6 is a flowchart schematically illustrating password door-opening of a smart lock provided by the present invention; and
[0092] Fig. 7 is a system block diagram illustrating an intelligent equipment system provided by the present invention.
Date Recue/Date Received 2022-05-09 DETAILED DESCRIPTION OF THE INVENTION
[0093] In order to make more lucid and clear the objectives, technical solutions, and advantages of the present invention, the technical solutions in the embodiments of the present invention will be clearly and comprehensively described below with reference to accompanying drawings in the embodiments of the present invention. Apparently, the embodiments as described are merely partial, rather than the entire, embodiments of the present invention. All other embodiments obtainable by persons ordinarily skilled in the art based on the embodiments in the present invention shall all be covered by the protection scope of the present invention.
[0094] As should be understood, such terms as "first" and "second" as used in the description of the present application are merely meant for descriptive purposes, and shall not be understood to indicate or imply relative importance. In addition, unless otherwise specified, such terms as "plural" and "plurality of' as used in the description of the present application mean "two or more".
[0095] Before the method of realizing an intelligent equipment system provided by the present invention is described, technical terms involved in the various embodiments of the present invention are firstly introduced as follows.
[0096] As regards "blockchain", it is a novel application pattern that merges together such computer techniques as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. In accordance with different degrees of centralization of the blockchain network, three types of blockchains are differentiated under different application scenarios:
[0097] 1. a blockchain that is public over the entire network, without any user authorization mechanism, is referred to as a public blockchain;

Date Recue/Date Received 2022-05-09
[0098] 2. a blockchain that allows access of authorized nodes to the networks, in which information can be viewed according to permission, and which is usually used among institutions, is referred to as an alliance chain;
[0099] 3. a blockchain in whose entire networks the nodes are all under control by one institution is referred to as a private blockchain.
[0100] Embodiment 1
[0101] Fig. 1 is a flowchart illustrating a method of realizing an intelligent equipment system provided by the present invention, as shown in Fig. 1, the method can comprise the following steps.
[0102] 101 - constituting a private blockchain network out of a plurality of intelligent equipments accessed to a local area network.
[0103] The plural intelligent equipments include, but are not limited to, smart locks, smart speakers, intelligent air-conditioners, intelligent television sets, and intelligent routers, etc. The intelligent equipment can utilize a sensor to collect such information as user fingerprint data and environmental data, etc., and the sensor can be either integrated on the intelligent equipment or connected with the intelligent equipment via a wired mode or a wireless mode.
[0104] 102 - obtaining, by each of the intelligent equipments, a smart contract having a plurality of functions released by a user, and deploying the smart contract onto the private blockchain network after confirmation by the user.
[0105] The smart contract possesses plural functions, including addition function, deletion function, query function, modification function, and verification function.

Date Recue/Date Received 2022-05-09
[0106] Specifically, the process can include the following:
[0107] The various intelligent equipments respectively obtain the smart contract released by the user through one of the following modes:
[0108] a client end having a contract releasing function;
[0109] an intelligent equipment from the plural intelligent equipments having a contract releasing function;
[0110] the client end can specifically be such a terminal equipment as a mobile terminal, a personal PC, etc.
[0111] After confirmation of the user by pressing a button, the various intelligent equipments deploy the smart contract onto the private blockchain network.
[0112] 103 - obtaining, by the intelligent equipment, user sensitive data in an equipment initialization request, when the intelligent equipment receives the equipment initialization request from the user.
[0113] The user sensitive data can be such user characteristic information as fingerprint data and iris data of the user, and other sensitive data can be further included.
[0114] In this embodiment, after the user has deployed the plural intelligent equipments to constitute the private blockchain network, it is required to initialize the intelligent equipments to facilitate subsequent use of the intelligent equipments. When it is required for the user to initialize an intelligent equipment, initialization can be performed by fingerprint input, taking a smart lock for example, the user can input his fingerprint data via a sensor in the smart lock, so as to initialize the smart lock.
[0115] 104 - generating corresponding first initial information for the user sensitive data, and invoking an addition function of the smart contract to write the first initial information in a private blockchain.

Date Recue/Date Received 2022-05-09
[0116] Specifically, the intelligent equipment converts the initial fingerprint data to an initial hash value, and generates an initial composite key according to the initial hash value and an equipment ID of the intelligent equipment; a value is generated according to a start mode of the intelligent equipment and an entry time of the initial fingerprint data; the initial composite key and the value are correspondingly written in a private blockchain through the addition function of the smart contract.
[0117] During the process of specific implementation, the intelligent equipment can employ a hash algorithm to perform hash computation on the initial fingerprint data, and to generate the initial hash value, and the hash algorithm can be any safe and reliable hash algorithm, such as 5HA256, 5M3 according to State Cryptography Administration or 5M4 according to State Cryptography Administration, etc.
[0118] In this embodiment of the present invention, since the initial information generated by the user sensitive data is written in the private blockchain through the smart contract, and the content of the smart contract cannot be modified when a single intelligent equipment is broken through, the originally deployed smart contract can be evaded only by breaking through the entire intelligent equipments in the private blockchain network to deploy a new smart contract, so it is difficult for illegal individuals to obtain the user sensitive data;
moreover, the user sensitive data can only be operated and read by the user, so the user sensitive data is rendered more secure; at the same time, since the plural intelligent equipments constituting the private blockchain network are accessed to the local area network, malicious attack by illegal individuals through the public network is made impossible; in addition, compared with prior-art technology in which the user must pass through the public network to access to the server for identification verification when the user sensitive data is stored in a cloud server, since the user sensitive data is stored in an LAN private blockchain according to the embodiments of the present invention, the user can directly access to the LAN for identification verification, so the ID
verification is Date Recue/Date Received 2022-05-09 made more highly effective.
[0119] Moreover, the method provided by this embodiment of the present invention can further comprise:
[0120] invoking, when the intelligent equipment receives a modification request of the user sensitive data from the user, a modification function of the smart contract to modify the user sensitive data; and invoking, when the intelligent equipment receives a deletion request of the user sensitive data from the user, a deletion function of the smart contract to delete the user sensitive data.
[0121] In this embodiment of the present invention, through the modification function or the deletion function of the smart contract, it is facilitated to modify or delete the user sensitive data.
[0122] Moreover, the method provided by this embodiment of the present invention can further comprise:
[0123] recording, by the intelligent equipment, operations on the user sensitive data in the private blockchain for the user's review and check.
[0124] In this embodiment of the present invention, by recording operations on the user sensitive data in the private blockchain, it is made possible to prevent the user sensitive data from being illegally enquired and tampered with, and hence to fully guarantee the privacy and safety of the user sensitive data.
[0125] Embodiment 2
[0126] Fig. 2 is a flowchart illustrating a method of realizing an intelligent equipment system provided by the present invention, in this embodiment, in addition to comprising the steps described with reference to Fig. 1, the method of realizing an intelligent equipment Date Recue/Date Received 2022-05-09 system further comprises steps 201 to 204; for the sake of brevity, the steps described with reference to Fig. 1 are omitted. As shown in Fig. 2, the method of realizing an intelligent equipment system further comprises the following.
[0127] 201 - obtaining, by the intelligent equipment, user input data in an equipment use request, when the intelligent equipment receives the equipment use request from the user.
[0128] In this embodiment, after the user has completed initialization of the intelligent equipment, the intelligent equipment can be correspondingly operated. Taking a smart lock for example, when it is required for the user to open the smart lock, the smart lock can be opened through fingerprint input, i.e., fingerprint data is input via a sensor in the smart lock.
[0129] 202 - generating corresponding information to be enquired for the user input data.
[0130] The user input data is fingerprint data of the user.
[0131] Specifically, the intelligent equipment converts the fingerprint data to a hash value, and generates a composite key according to the hash value and the equipment ID of the intelligent equipment to serve as the information to be enquired.
[0132] During the process of specific implementation, the intelligent equipment can employ a hash algorithm to perform hash computation on the user input data, and to generate the hash value, and the hash algorithm can be any safe and reliable hash algorithm, such as 5HA256, 5M3 according to State Cryptography Administration or 5M4 according to State Cryptography Administration, etc.
[0133] 203 - invoking a query function of the smart contract to enquire the information to be enquired in the private blockchain.

Date Recue/Date Received 2022-05-09
[0134] Specifically, the query function of the smart contract is invoked to enquire whether there is a value that corresponds to the composite key in the private blockchain, and a query result returned by the smart contract is received. The query result is employed to indicate whether the intelligent equipment can be used and operated.
[0135] 204 - determining, by the intelligent equipment, whether a use operation is allowed according to a query result of the smart contract.
[0136] When the query result expresses successful query, the intelligent equipment is allowed to be used and operated, when the query result expresses failed query, the intelligent equipment is not allowed to be used and operated.
[0137] In this embodiment of the present invention, when the user is using the intelligent equipment, input data of the user is obtained and corresponding information to be enquired is generated, and corresponding query is performed by invoking the query function of the smart contract, so as to determine whether the intelligent equipment is allowed to be used and operated according to the query result returned by the smart contract, whereby it is made possible to prevent the intelligent equipment from being controlled by illegal individuals.
[0138] Embodiment 3
[0139] Fig. 3 is a flowchart illustrating a method of realizing an intelligent equipment system provided by the present invention, in this embodiment, in addition to comprising the steps described with reference to Fig. 1, the method of realizing an intelligent equipment system further comprises steps 301 to 304; for the sake of brevity, the steps described with reference to Fig. 1 are omitted. As shown in Fig. 3, the method of realizing an intelligent equipment system further comprises the following.

Date Recue/Date Received 2022-05-09
[0140] 301 - obtaining, when a client end of the user receives an equipment initialization request of the intelligent equipment of the user, by the client end, an initial password set by the user.
[0141] In this embodiment, after the user has deployed the plural intelligent equipments to constitute the private blockchain network, it is required to initialize the intelligent equipments to facilitate subsequent use of the intelligent equipments. When it is required for the user to initialize an intelligent equipment, initialization of the intelligent equipment can be further performed by password input in addition to fingerprint input.
Taking a smart lock for example, the user can employ a handset client end to set the door-opening password of the smart lock, so as to initialize the smart lock.
[0142] 302 - employing a preset algorithm to generate corresponding second initial information for the initial password.
[0143] The preset algorithm is a hash algorithm.
[0144] Specifically, the client end can employ a hash algorithm to perform hash computation on the initial password, and to generate an initial hash value, and the hash algorithm can be any safe and reliable hash algorithm, such as 5HA256, 5M3 according to State Cryptography Administration or 5M4 according to State Cryptography Administration, etc.
[0145] 303 - correspondingly writing the equipment ID of the intelligent equipment, the second initial information and the preset algorithm in a verification function of the smart contract, to update the smart contract.
[0146] 304 - upgrading, by the various intelligent equipments, the smart contract according to a Date Recue/Date Received 2022-05-09 confirmation operation of the user.
[0147] Specifically, after confirmation of the user by pressing a button, each intelligent equipment upgrades the smart contract.
[0148] In this embodiment of the present invention, since the second initial information generated by the initial password set by the user is written in the private blockchain through the smart contract, when it is required for the user to change the initial password, this can be achieved by upgrading the contract.
[0149] Embodiment 4
[0150] Fig. 4 is a flowchart illustrating a method of realizing an intelligent equipment system provided by the present invention, in this embodiment, in addition to comprising the steps described with reference to Fig. 3, the method of realizing an intelligent equipment system further comprises steps 401 to 403; for the sake of brevity, the steps described with reference to Fig. 3 are omitted. As shown in Fig. 4, the method of realizing an intelligent equipment system further comprises the following.
[0151] 401 - obtaining, by the intelligent equipment, an input password of the user, when the intelligent equipment receives the equipment use request from the user.
[0152] In this embodiment, after the user has completed initialization of the intelligent equipment, the intelligent equipment can be correspondingly operated. Taking a smart lock for example, when it is required for the user to open the smart lock, the smart lock can be opened through password input, i.e., the password is input via a mobile client end in the smart lock.
[0153] 402 - invoking the verification function of the smart contract to enable the smart contract Date Recue/Date Received 2022-05-09 to employ the preset algorithm to generate corresponding information for the input password, and performing comparative verification of the information with the second initial information that corresponds to the equipment ID of the intelligent equipment.
[0154] Specifically, the intelligent equipment invokes the verification function of the smart contract to perform hash computation on the input password through the smart contract, performs a comparative verification of the hash computation result with the hash computation result of the initial password of the smart contract, and generates a verification result; the verification result is used to indicate whether the intelligent equipment is allowed to be used and operated.
[0155] 403 - receiving a verification result returned by the smart contract, and determining whether a use operation is allowed according to the verification result.
[0156] The verification result is used to indicate whether the intelligent equipment is allowed to be used and operated.
[0157] When the verification result expresses successful verification, the intelligent equipment is allowed to be used and operated, when the verification result expresses failed verification, the intelligent equipment is not allowed to be used and operated.
[0158] In this embodiment of the present invention, when the user is using the intelligent equipment, the input password of the user is obtained, and corresponding verification is made by invoking the verification function of the smart contract, so that it is determined according to the verification result returned by the smart contract as to whether the intelligent equipment is allowed to be used and operated, so as to prevent the intelligent equipment from being controlled by illegal individuals.
[0159] Embodiment 5 Date Recue/Date Received 2022-05-09
[0160] This embodiment of the present invention provides a method of controlling an intelligent equipment, the method is applied to an intelligent equipment in a private blockchain network, the private blockchain network consists of the intelligent equipment and other intelligent equipments, the private blockchain network is deployed with a smart contract released by a user, and the method comprises the following steps.
[0161] 501 - obtaining, by the intelligent equipment, user input data in an equipment use request, when the intelligent equipment receives the equipment use request from the user.
[0162] Specifically, this step is identical with step 201, so it is not redundantly described in this context.
[0163] 502 - generating corresponding information to be enquired for the user input data.
[0164] Specifically, this step is identical with step 202, so it is not redundantly described in this context.
[0165] 503 - invoking the smart contract to enquire the information to be enquired in a private blockchain, wherein initial information generated on the basis of user sensitive data is prestored in the private blockchain.
[0166] Specifically, this step is identical with step 203, so it is not redundantly described in this context.
[0167] 504 - determining whether a use operation is allowed according to a query result of the smart contract.
[0168] Specifically, this step is identical with step 204, so it is not redundantly described in this Date Recue/Date Received 2022-05-09 context.
[0169] In this embodiment of the present invention, when the user is using the intelligent equipment, input data of the user is obtained and corresponding information to be enquired is generated, and corresponding query is performed by invoking the smart contract, so as to determine whether the intelligent equipment is allowed to be used and operated according to the query result returned by the smart contract, whereby it is made possible to prevent the intelligent equipment from being controlled by illegal individuals.
[0170] Embodiment 6
[0171] This embodiment of the present invention provides a method of controlling an intelligent equipment, the method is applied to an intelligent equipment in a private blockchain network, the private blockchain network consists of the intelligent equipment and other intelligent equipments, the private blockchain network is deployed with a smart contract released by a user, and the method comprises the following steps.
[0172] 601 - obtaining, by the intelligent equipment, an input password of the user, when the intelligent equipment receives an equipment use request from the user.
[0173] Specifically, this step is identical with step 401, so it is not redundantly described in this context.
[0174] 602 - invoking the smart contract to enable the smart contract to employ a preset algorithm to generate corresponding information for the input password, and performing comparative verification of the information with initial information that corresponds to an equipment ID of the intelligent equipment, wherein the initial information is generated on the basis of an initial password set by the user.

Date Recue/Date Received 2022-05-09
[0175] Specifically, this step is identical with step 402, so it is not redundantly described in this context.
[0176] 603 - receiving a verification result returned by the smart contract, and determining whether a use operation is allowed according to the verification result.
[0177] Specifically, this step is identical with step 403, so it is not redundantly described in this context.
[0178] In this embodiment of the present invention, when the user is using the intelligent equipment, the input password of the user is obtained, and corresponding verification is made by invoking the smart contract, so that it is determined according to the verification result returned by the smart contract as to whether the intelligent equipment is allowed to be used and operated, so as to prevent the intelligent equipment from being controlled by illegal individuals.
[0179] The method provided by the embodiment of the present invention is exemplarily described below in conjunctions with Figs. 5 and 6. Suppose that the plural intelligent equipments accessed to the local area network include a smart lock, a smart speaker, an intelligent television set, and an intelligent router, after the method according to the embodiment of the present invention has been executed on these plural intelligent equipments, the framework of the resultant intelligent equipment system is as schematically shown with reference to Fig. 5. Suppose that the user uses a smart lock to open the door, as shown in Fig. 6, which is a flowchart schematically illustrating password door-opening of a smart lock provided by the present invention, the user inputs a password, the smart lock invokes the verification function of the smart contract to perform corresponding verification, and the smart lock allows the door-opening operation when the verification succeeds.

Date Recue/Date Received 2022-05-09
[0180] Embodiment 7
[0181] Fig. 7 is a system block diagram illustrating an intelligent equipment system provided by the present invention, the system can comprise a client end and a plurality of intelligent equipments accessed to a local area network, and the plural intelligent equipments constitute a private blockchain network, as shown in Fig. 7, to facilitate clear description, the intelligent equipment system that is based on blockchain is described below merely with a client end 710 and an intelligent equipment 720 that is located in the private blockchain network, of which the intelligent equipment 720 is configured as anyone of the plural intelligent equipments:
[0182] the client end 710 includes:
[0183] a contract releasing module 711, for releasing a smart contract having plural functions to various intelligent equipments of the private blockchain network;
[0184] the intelligent equipment 720 includes:
[0185] a contract obtaining module 721, for obtaining, respectively with other intelligent equipments in the private blockchain network, a smart contract having a plurality of functions released by a user;
[0186] a contract deploying module 722, for deploying the smart contract onto the private blockchain network after confirmation by the user;
[0187] a data obtaining module 723, for obtaining user sensitive data in an equipment initialization request, when the equipment initialization request is received from the user;
[0188] a first generating module 724, for generating corresponding first initial information for the user sensitive data; and
[0189] a contract invoking module 725, for invoking an addition function of the smart contract to write the first initial information in a private blockchain.
[0190] Moreover, the data obtaining module 723 is further employed for obtaining user input data in an equipment use request, when the equipment use request is received from the user;

Date Recue/Date Received 2022-05-09
[0191] the first generating module 724 is further employed for generating corresponding information to be enquired for the user input data;
[0192] the contract invoking module 725 is further employed for invoking a query function of the smart contract to enquire the information to be enquired in the private blockchain;
[0193] the intelligent equipment 720 further includes:
[0194] an operation controlling module 726, for determining whether the intelligent equipment is allowed to be used and operated according to a query result of the smart contract.
[0195] Further, the user sensitive data is initial fingerprint data input by the user, and the first generating module 724 is specifically employed for:
[0196] converting the initial fingerprint data to an initial hash value, and generating an initial composite key according to the initial hash value and an equipment ID of the intelligent equipment; and
[0197] generating a value according to a start mode of the intelligent equipment and an entry time of the initial fingerprint data;
[0198] the contract invoking module is specifically employed for:
[0199] correspondingly writing the initial composite key and the value in the private blockchain through the addition function of the smart contract.
[0200] Further, the user input data is fingerprint data of the user, and the first generating module 724 is specifically further employed for:
[0201] converting the fingerprint data to a hash value, and generating a composite key according to the hash value and the equipment ID of the intelligent equipment;
[0202] the contract invoking module 725 is specifically further employed for:
[0203] invoking the query function of the smart contract to enquire whether there is a value that corresponds to the composite key in the private blockchain, and receiving a query result returned by the smart contract; wherein
[0204] the query result is employed to indicate whether the intelligent equipment is allowed to be used and operated.
Date Recue/Date Received 2022-05-09
[0205] Moreover, the client end 710 further includes:
[0206] a password obtaining module 712, for obtaining, when an equipment initialization request of the intelligent equipment is received from the user, by the client end, an initial password set by the user;
[0207] a second generating module 713, for employing a preset algorithm to generate corresponding second initial information for the initial password; and
[0208] an information writing module 714, for correspondingly writing the equipment ID of the intelligent equipment, the second initial information and the preset algorithm in a verification function of the smart contract, to update the smart contract;
[0209] the intelligent equipment further includes:
[0210] a contract upgrading module 727, for upgrading the smart contract according to a confirmation operation of the user.
[0211] Further, the data obtaining module 723 is specifically further employed for:
[0212] obtaining an input password of the user, when the equipment use request is received from the user;
[0213] the contract invoking module 725 is specifically further employed for:
[0214] invoking the verification function of the smart contract to enable the smart contract to employ the preset algorithm to generate corresponding information for the input password, and performing comparative verification of the information with the second initial information that corresponds to the equipment ID of the intelligent equipment;
and
[0215] receiving a verification result returned by the smart contract, and determining whether a use operation is allowed according to the verification result.
[0216] Further, the preset algorithm is a hash algorithm.
[0217] Moreover, the contract invoking module 725 is specifically further employed for:
[0218] invoking, when a modification request of the user sensitive data is received from the user, Date Recue/Date Received 2022-05-09 a modification function of the smart contract to modify the user sensitive data; and
[0219] invoking, when a deletion request of the user sensitive data is received from the user, a deletion function of the smart contract to delete the user sensitive data.
[0220] As should be noted, the intelligent equipment system provided by the above embodiment is merely exemplarily described by being divided into the aforementioned various functional modules, whereas in practical application, it is possible to assign these functions to different functional modules to be completed there according to requirements, that is to say, the internal structure of the device can be divided into different functional modules to complete the entire or partial functions mentioned above. In addition, the intelligent equipment system pertains to the same conception as the method of realizing an intelligent equipment system and the methods of controlling an intelligent equipment ¨ see the method embodiments for details of its specific implementation process, while no repetition is made in this context.
[0221] As can be understood by persons ordinarily skilled in the art, the entire or partial steps that realize the aforementioned embodiments can be completed via hardware, and can also be completed via a program that instructs relevant hardware, the program can be stored in a computer-readable storage medium, and the storage medium can be a read-only memory, a magnetic disk or an optical disk, etc.
[0222] What the above describes is merely directed to preferred embodiments of the present invention, and is not meant to restrict the present invention. Any modification, equivalent substitution, and improvement makeable within the spirit and principle of the present invention shall all be covered by the protection scope of the present invention.

Date Recue/Date Received 2022-05-09

Claims (12)

CA 03160728 2022-05-09What is claimed is:
1. A method of realizing an intelligent equipment system, characterized in comprising:
constituting a private blockchain network out of a plurality of intelligent equipments accessed to a local area network;
obtaining, by each of the intelligent equipments, a smart contract having a plurality of functions released by a user, and deploying the smart contract onto the private blockchain network after confirmation by the user;
obtaining, by the intelligent equipment, user sensitive data in an equipment initialization request, when the intelligent equipment receives the equipment initialization request from the user; and generating corresponding first initial information for the user sensitive data, and invoking an addition function of the smart contract to write the first initial information in a private blockchain.
2. The method according to Claim 1, characterized in that, after the step of invoking an addition function of the smart contract to write the information in a private blockchain, the method further comprises:
obtaining, by the intelligent equipment, user input data in an equipment use request, when the intelligent equipment receives the equipment use request from the user;
generating corresponding information to be enquired for the user input data, and invoking a query function of the smart contract to enquire the information to be enquired in the private blockchain;
and determining, by the intelligent equipment, whether a use operation is allowed according to a query result of the smart contract.
3. The method according to Claim 1 or 2, characterized in that the user sensitive data is initial fingerprint data input by the user, and that the step of generating corresponding first initial information for the user sensitive data, and invoking an addition function of the smart contract Date Recue/Date Received 2022-05-09 to write the first initial information in a private blockchain includes:
converting, by the intelligent equipment, the initial fingerprint data to an initial hash value, and generating an initial composite key according to the initial hash value and an equipment ID of the intelligent equipment;
generating a value according to a start mode of the intelligent equipment and an entry time of the initial fingerprint data; and correspondingly writing the initial composite key and the value in the private blockchain through the addition function of the smart contract.
4. The method according to Claim 3, characterized in that the user input data is fingerprint data of the user, and that the step of generating corresponding information to be enquired for the user input data, and invoking a query function of the smart contract to enquire the information to be enquired in the private blockchain includes:
converting, by the intelligent equipment, the fingerprint data to a hash value, and generating a composite key according to the hash value and the equipment ID of the intelligent equipment;
and invoking the query function of the smart contract to enquire whether there is a value that corresponds to the composite key in the private blockchain, and receiving a query result returned by the smart contract; wherein the query result is employed to indicate whether the intelligent equipment is allowed to be used and operated.
5. The method according to Claim 1, characterized in further comprising:
obtaining, when a client end of the user receives an equipment initialization request of the intelligent equipment of the user, by the client end, an initial password set by the user;
employing a preset algorithm to generate corresponding second initial information for the initial password;
correspondingly writing the equipment ID of the intelligent equipment, the second initial information and the preset algorithm in a verification function of the smart contract, to update Date Recue/Date Received 2022-05-09 the smart contract; and upgrading, by the various intelligent equipments, the smart contract according to a confirmation operation of the user.
6. The method according to Claim 5, characterized in that, after the step of upgrading, by the various intelligent equipments, the smart contract according to a confirmation operation of the user, the method further comprises:
obtaining, by the intelligent equipment, an input password of the user, when the intelligent equipment receives the equipment use request from the user;
invoking the verification function of the smart contract to enable the smart contract to employ the preset algorithm to generate corresponding information for the input password, and performing comparative verification of the information with the second initial information that corresponds to the equipment ID of the intelligent equipment; and receiving a verification result returned by the smart contract, and determining whether a use operation is allowed according to the verification result.
7. The method according to Claim 5 or 6, characterized in that the preset algorithm is a hash algorithm.
8. The method according to Claim 1, characterized in further comprising:
invoking, when the intelligent equipment receives a modification request of the user sensitive data from the user, a modification function of the smart contract to modify the user sensitive data;
and invoking, when the intelligent equipment receives a deletion request of the user sensitive data from the user, a deletion function of the smart contract to delete the user sensitive data.
9. A method of controlling an intelligent equipment, characterized in that the method is applied to an intelligent equipment in a private blockchain network, that the private blockchain network consists of the intelligent equipment and other intelligent equipments, that the private blockchain Date Recue/Date Received 2022-05-09 network is deployed with a smart contract released by a user, and that the method comprises:
obtaining, by the intelligent equipment, user input data in an equipment use request, when the intelligent equipment receives the equipment use request from the user;
generating corresponding information to be enquired for the user input data, and invoking the smart contract to enquire the information to be enquired in a private blockchain, wherein initial information generated on the basis of user sensitive data is prestored in the private blockchain;
and determining whether a use operation is allowed according to a query result of the smart contract.
10. A method of controlling an intelligent equipment, characterized in that the method is applied to an intelligent equipment in a private blockchain network, that the private blockchain network consists of the intelligent equipment and other intelligent equipments, that the private blockchain network is deployed with a smart contract released by a user, and that the method comprises:
obtaining, by the intelligent equipment, an input password of the user, when the intelligent equipment receives an equipment use request from the user;
invoking the smart contract to enable the smart contract to employ a preset algorithm to generate corresponding information for the input password, and performing comparative verification of the information with initial information that corresponds to an equipment ID
of the intelligent equipment, wherein the initial information is generated on the basis of an initial password set by the user; and receiving a verification result returned by the smart contract, and determining whether a use operation is allowed according to the verification result.
11. An intelligent equipment system, characterized in that the system comprises a plurality of intelligent equipments accessed to a local area network, that the plural intelligent equipments constitute a private blockchain network, and that the various intelligent equipments each include:
a contract obtaining module, for obtaining, respectively with other intelligent equipments in the private blockchain network, a smart contract having a plurality of functions released by a user;

Date Recue/Date Received 2022-05-09 a contract deploying module, for deploying the smart contract onto the private blockchain network after confirmation by the user;
a data obtaining module, for obtaining user sensitive data in an equipment initialization request, when the equipment initialization request is received from the user;
a first generating module, for generating corresponding first initial information for the user sensitive data; and a contract invoking module, for invoking an addition function of the smart contract to write the initial information in a private blockchain.
12. The system according to Claim 11, characterized in that:
the data obtaining module is further employed for obtaining user input data in an equipment use request, when the equipment use request is received from the user; that the first generating module is further employed for generating corresponding information to be enquired for the user input data; that the contract invoking module is further employed for invoking a query function of the smart contract to enquire the information to be enquired in the private blockchain;
and that the various intelligent equipments each further include:
an operation controlling module, for determining whether the intelligent equipment is allowed to be used and operated according to a query result of the smart contract.

Date Recue/Date Received 2022-05-09
CA3160728A 2018-11-15 2019-09-19 Method of realizing intelligent equipment system, method of controlling intelligent equipement, and system Pending CA3160728A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN201811359532.9A CN109660514B (en) 2018-11-15 2018-11-15 Implementation method of intelligent equipment system, intelligent equipment control method and system
CN201811359532.9 2018-11-15
PCT/CN2019/106753 WO2020098382A1 (en) 2018-11-15 2019-09-19 Implementation method for smart device system, smart device control method and system

Publications (1)

Publication Number Publication Date
CA3160728A1 true CA3160728A1 (en) 2020-05-22

Family

ID=66112020

Family Applications (1)

Application Number Title Priority Date Filing Date
CA3160728A Pending CA3160728A1 (en) 2018-11-15 2019-09-19 Method of realizing intelligent equipment system, method of controlling intelligent equipement, and system

Country Status (3)

Country Link
CN (1) CN109660514B (en)
CA (1) CA3160728A1 (en)
WO (1) WO2020098382A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109660514B (en) * 2018-11-15 2020-06-09 苏宁易购集团股份有限公司 Implementation method of intelligent equipment system, intelligent equipment control method and system
CN110716745A (en) * 2019-10-21 2020-01-21 星矿科技(北京)有限公司 Method for constructing off-center community by using block chain and intelligent contract
CN111046078B (en) * 2019-11-11 2023-09-05 京东科技信息技术有限公司 Credit investigation method and device based on block chain and electronic equipment
CN112637274A (en) * 2020-12-04 2021-04-09 山西特信环宇信息技术有限公司 Cone block chain terminal and access method thereof
CN113347185B (en) * 2021-06-01 2023-04-18 佳乔(深圳)投资有限公司 Internet of things equipment management method based on block chain

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107306183B (en) * 2016-04-22 2021-12-21 索尼公司 Client, server, method and identity verification system
CN106796685A (en) * 2016-12-30 2017-05-31 深圳前海达闼云端智能科技有限公司 Block chain authority control method and device and node equipment
CN107341702B (en) * 2017-03-08 2020-06-23 创新先进技术有限公司 Service processing method and device
US20180315055A1 (en) * 2017-05-01 2018-11-01 International Business Machines Corporation Blockchain For Issue/Defect Tracking System
WO2019036831A1 (en) * 2017-08-21 2019-02-28 达闼科技成都有限公司 Information selection method, apparatus, electronic device and computer-readable storage medium
CN107622385A (en) * 2017-08-28 2018-01-23 南京邮电大学 A kind of copyright distributing method based on block chain intelligence contract
KR101881045B1 (en) * 2017-11-15 2018-07-23 주식회사 가온시스템 System and method for providing medical information based on block chain
CN108460290A (en) * 2017-12-27 2018-08-28 江苏省卫生统计信息中心 A kind of Electronic Health Record management system and method
CN108171430B (en) * 2017-12-29 2021-12-07 深圳市轱辘车联数据技术有限公司 Data processing method, vehicle-mounted equipment and UBI analysis center server
CN108364180A (en) * 2018-01-31 2018-08-03 复旦大学 A kind of shared electricity transaction method based on block chain
CN108494090B (en) * 2018-04-16 2020-10-02 华东师范大学 Energy networking intelligent device and system based on block chain
CN108717861B (en) * 2018-04-16 2020-07-14 上海交通大学 Medical data sharing method based on block chain
CN108647966A (en) * 2018-05-09 2018-10-12 深圳市融讯科技有限公司 A kind of data interactive method and device based on block chain
CN109660514B (en) * 2018-11-15 2020-06-09 苏宁易购集团股份有限公司 Implementation method of intelligent equipment system, intelligent equipment control method and system

Also Published As

Publication number Publication date
WO2020098382A1 (en) 2020-05-22
CN109660514B (en) 2020-06-09
CN109660514A (en) 2019-04-19

Similar Documents

Publication Publication Date Title
CA3160728A1 (en) Method of realizing intelligent equipment system, method of controlling intelligent equipement, and system
US9330513B2 (en) Resource management based on biometric data
US11556617B2 (en) Authentication translation
US7987357B2 (en) Disabling remote logins without passwords
KR20160097323A (en) Near field communication authentication mechanism
WO2013107362A1 (en) Method and system for protecting data
US20220245631A1 (en) Authentication method and apparatus of biometric payment device, computer device, and storage medium
Rahim et al. Sensor based PUF IoT authentication model for a smart home with private blockchain
EP3794485B1 (en) Method and network node for managing access to a blockchain
US20200218819A1 (en) Sfs access control method and system, sfs and terminal device
CN116192483A (en) Authentication method, device, equipment and medium
US20240048562A1 (en) Sponsor delegation for multi-factor authentication
JP2020521341A (en) Cryptographic key management based on identification information
WO2020159328A1 (en) Authentication information processing method and apparatus and user terminal including authentication information processing method apparatus
US20090327704A1 (en) Strong authentication to a network
US20220394042A1 (en) Protecting physical locations with continuous multi-factor authentication systems
JP2004206258A (en) Multiple authentication system, computer program, and multiple authentication method
CN111292444A (en) Real estate as tradable digital assets via blockchain integration
CN111369710A (en) Intelligent lock system supported by block chain
US11790115B1 (en) Privacy preserving data processing in a Solid ecosystem using agents
US20230344830A1 (en) Continuous multifactor authentication system integration with corporate security systems
Angelogianni Analysis and Implementation of the Fido Protocol in a Trusted Environment
US10757097B2 (en) Temporal identity vaulting
Tank et al. Security analysis of OpenStack keystone
KR20230089559A (en) Blockchain-based fido authentication system

Legal Events

Date Code Title Description
EEER Examination request

Effective date: 20220916

EEER Examination request

Effective date: 20220916

EEER Examination request

Effective date: 20220916

EEER Examination request

Effective date: 20220916

EEER Examination request

Effective date: 20220916