WO2020098382A1 - Procédé de mise en œuvre pour système de dispositif intelligent, procédé et système de commande de dispositif intelligent - Google Patents

Procédé de mise en œuvre pour système de dispositif intelligent, procédé et système de commande de dispositif intelligent Download PDF

Info

Publication number
WO2020098382A1
WO2020098382A1 PCT/CN2019/106753 CN2019106753W WO2020098382A1 WO 2020098382 A1 WO2020098382 A1 WO 2020098382A1 CN 2019106753 W CN2019106753 W CN 2019106753W WO 2020098382 A1 WO2020098382 A1 WO 2020098382A1
Authority
WO
WIPO (PCT)
Prior art keywords
smart
user
smart device
contract
private chain
Prior art date
Application number
PCT/CN2019/106753
Other languages
English (en)
Chinese (zh)
Inventor
姚雷
姚平
李蕊
Original Assignee
苏宁云计算有限公司
苏宁易购集团股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 苏宁云计算有限公司, 苏宁易购集团股份有限公司 filed Critical 苏宁云计算有限公司
Priority to CA3160728A priority Critical patent/CA3160728A1/fr
Publication of WO2020098382A1 publication Critical patent/WO2020098382A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Definitions

  • the present invention relates to the field of blockchain technology, and in particular, to an intelligent device system implementation method, intelligent device control method, and system.
  • Smart device refers to any kind of device, apparatus or machine with computing power.
  • smart devices With the development of science, more and more smart devices appear in people's daily life, such as smart door locks, smart speakers, smart air conditioners , Smart TV, smart routing, etc., these smart devices are connected to the network through the WiFi of the home router, and then controlled by the application of the smartphone.
  • the inventor found that many data of the existing smart devices are stored in the cloud of the manufacturer, and then controlled by the mobile phone, which is easy to cause leakage of personal information, and criminals also You can use vulnerabilities to tamper with data to achieve the purpose of controlling smart devices.
  • the purpose of the present invention is to provide a method for implementing a smart device system, a smart device control method and a system, storing user sensitive data in a smart device on a private chain through a smart contract, which can avoid the leakage of user sensitive data and fully guarantee the user The privacy and security of sensitive data.
  • a method for implementing a smart device system including:
  • Each of the smart devices obtains a smart contract with multiple functions issued by the user, and deploys the smart contract on the private chain network after confirmation by the user;
  • the smart device When the smart device receives the device initialization request of the user, the smart device obtains the user sensitive data in the device initialization request;
  • the method further includes:
  • the smart device When the smart device receives the user's device use request, the smart device obtains user input data in the device use request, and generates corresponding information to be queried for the user input data;
  • the smart device determines whether to allow the operation to be used according to the query result of the smart contract.
  • the user-sensitive data is initial fingerprint data input by the user, and the corresponding first initial information is generated for the user-sensitive data, and the additional function of the smart contract is invoked to transfer the first
  • An initial message is written into the private chain, including:
  • the user input data is fingerprint data of the user
  • the corresponding query information is generated for the user input data
  • the query function of the smart contract is invoked to store the query information in the private Query in the chain, including:
  • the smart device converts the fingerprint data into a hash value, and generates a composite key according to the hash value and the device ID of the smart device;
  • the query result is used to indicate whether the smart device is allowed to be used for operation.
  • the method further includes:
  • the client When the client receives the device initialization request of the user for the smart device, the client obtains the initial password set by the user, and generates a corresponding 2. Initial information;
  • Each smart device upgrades the smart contract according to the user's confirmation operation.
  • the method further includes:
  • the smart device When the smart device receives the user's device use request, the smart device obtains the user's input password;
  • the preset algorithm is a hash algorithm.
  • the method further includes:
  • the smart device When the smart device receives the user's request to modify the user's sensitive data, it calls the modification function of the smart contract to modify the user's sensitive data;
  • the smart device When the smart device receives the user's request to delete the user's sensitive data, it calls the delete function of the smart contract to delete the user's sensitive data.
  • a method for controlling a smart device is provided.
  • the method is applied to a smart device in a private chain network.
  • the private chain network is composed of the smart device and other smart devices, and the private chain network is deployed.
  • the method includes:
  • the smart device When the smart device receives the user's device use request, the smart device obtains the user input data in the device use request;
  • a method for controlling a smart device is provided.
  • the method is applied to a smart device in a private chain network.
  • the private chain network is composed of the smart device and other smart devices, and the private chain network is deployed with
  • the method includes:
  • the smart device When the smart device receives the user's device use request, the smart device obtains the user's input password;
  • the smart contract uses the preset algorithm to generate corresponding information on the input password, and compares and verifies the information with the initial information corresponding to the device ID of the smart device, Wherein, the initial information is generated based on the initial password set by the user;
  • an intelligent device system in a fourth aspect, includes a client and multiple smart devices connected to a local area network, and the multiple smart devices form a private chain network;
  • Each of the smart devices includes:
  • a contract acquisition module which is used to separately acquire smart contracts with multiple functions issued by the user through the client with other smart devices in the private chain network;
  • a contract deployment module for deploying the smart contract to the private chain network after confirmation by the user
  • a data acquisition module configured to acquire user sensitive data in the device initialization request when receiving the device initialization request of the user
  • a first generating module configured to generate corresponding first initial information for the user sensitive data
  • a contract invoking module for invoking the added function of the smart contract to write the first initial information into the private chain.
  • the data acquisition module is further configured to acquire user input data in the device use request when receiving the user device use request;
  • the first generating module is also used to generate corresponding information to be queried by the user input data
  • the contract calling module is also used to call the query function of the smart contract to query the information to be queried in the private chain;
  • Each of the smart devices further includes:
  • the operation control module is used to determine whether the smart device is allowed to be operated according to the query result of the smart contract.
  • the user sensitive data is initial fingerprint data input by the user
  • the first generation module is specifically configured to:
  • the contract calling module is specifically used for:
  • the user input data is fingerprint data of the user
  • the first generation module is specifically further used to:
  • the contract calling module is also specifically used for:
  • the query result is used to indicate whether the smart device is allowed to be used for operation.
  • system further includes a client, and the client includes:
  • a password obtaining module configured to obtain the initial password set by the user by the client when receiving the device initialization request of the user for the smart device;
  • a second generation module configured to generate corresponding second initial information for the initial password using a preset algorithm
  • An information writing module configured to write the device ID of the smart device, the second initial information corresponding to the preset algorithm into the verification function of the smart contract, so as to update the smart contract;
  • Each of the smart devices further includes:
  • a contract upgrade module is used to upgrade the smart contract according to the confirmation operation of the user.
  • the data acquisition module is also specifically used to:
  • the contract calling module is also specifically used for:
  • the preset algorithm is a hash algorithm.
  • contract calling module is also specifically used for:
  • the delete function of the smart contract is called to delete the sensitive data of the user.
  • the user sensitive data is stored in the private chain of the local area network, the leakage of the user sensitive data is avoided, which makes it difficult for criminals to obtain the user sensitive data, and the user sensitive data can only be operated and read by the user, thereby avoiding
  • FIG. 1 is a flowchart of a method for implementing an intelligent device system provided by the present invention
  • FIG. 2 is a flowchart of an implementation method of a smart device system provided by the present invention.
  • FIG. 3 is a flowchart of a method for implementing an intelligent device system provided by the present invention.
  • FIG. 4 is a flowchart of an implementation method of a smart device system provided by the present invention.
  • FIG. 5 is a schematic structural diagram of a smart device system provided by the present invention.
  • FIG. 6 is a schematic flowchart of the smart door lock password opening process provided by the present invention.
  • FIG. 7 is a system block diagram of an intelligent device system provided by the present invention.
  • the blockchain is a new application model that integrates computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. According to the degree of centralization of the blockchain network, three different application scenarios of blockchains are differentiated:
  • the whole network is open, and the blockchain without user authorization mechanism is called public chain;
  • All the nodes in the network are in the hands of an institution, called a private chain.
  • FIG. 1 is a flowchart of a method for implementing an intelligent device system provided by the present invention. As shown in FIG. 1, the method may include the following steps:
  • a private chain network is formed for multiple smart devices connected to the local area network.
  • multiple smart devices include but are not limited to smart door locks, smart speakers, smart air conditioners, smart TVs, smart routers, etc.
  • Smart devices can use sensors to collect user fingerprint data, environmental data, and other information.
  • the sensors can be integrated on the smart device, or can be connected to the smart device through wired or wireless means.
  • Each smart device obtains a smart contract with multiple functions issued by the user, and deploys the smart contract to the private chain network after the user confirms it.
  • the smart contract has multiple functions, including: add function, delete function, query function, modify function and verification function;
  • the process may include:
  • Each smart device obtains a smart contract issued by the user in one of the following ways:
  • Smart devices with contract issuance function among multiple smart devices
  • the client may specifically be a terminal device such as a mobile terminal or a personal PC.
  • the smart contract is deployed on the private chain network.
  • the smart device When the smart device receives the user's device initialization request, the smart device obtains the user sensitive data in the device initialization request.
  • the user sensitive data may be user characteristic information such as user fingerprint data, iris data, or other sensitive data.
  • the user after deploying multiple smart devices to form a private chain network, the user needs to initialize the smart devices so that the smart devices can be used later.
  • the fingerprint input method can be used for initialization. Taking the smart door lock as an example, the user can input his fingerprint data into the smart door lock through the sensor to initialize the smart door lock.
  • the smart device converts the initial fingerprint data into an initial hash value, and generates an initial composite key based on the initial hash value and the device ID of the smart device; a value value is generated according to the startup method of the smart device and the entry time of the initial fingerprint data; Write the initial composite key and value to the private chain through the added function of the smart contract.
  • the smart device can use the hash algorithm to hash the initial fingerprint data to generate an initial hash value, where the hash algorithm can be any safe and reliable hash algorithm, such as SHA256, State Secret SM3 or State Secret SM4, etc. .
  • the initial information generated by the user's sensitive data is written into the private chain through a smart contract, and the content of the smart contract cannot be modified when a single smart device is broken, only all smart devices in the private chain network can be deployed New smart contracts can bypass the previously deployed smart contracts, which makes it difficult for criminals to obtain user sensitive data, and user sensitive data can only be operated and read by users, thereby making user sensitive data more secure; at the same time, due to the composition Multiple smart devices in the private chain network are connected to the local area network, making it impossible for criminals to conduct malicious attacks through the public network; in addition, compared with the existing technology, when user sensitive data is stored in the cloud, users must connect through the public network The server performs identity verification. Since the user sensitive data is stored in the private chain of the local area network in the embodiment of the present invention, the user can directly access the local area network for identity verification, and the identity verification is more efficient.
  • the method provided by the embodiment of the present invention may further include:
  • the smart contract's modification function is called to modify the user's sensitive data;
  • the smart contract's deletion function is called Delete sensitive user data.
  • the modification function or the deletion function of the smart contract facilitates the modification or deletion of the user's sensitive data.
  • the method provided by the embodiment of the present invention may further include:
  • the smart device records the operation of the user's sensitive data on the private chain for the user to trace and view.
  • the operation of the user's sensitive data is recorded on the private chain, which can prevent the user's sensitive data from being illegally queried and tampered, and thus can fully guarantee the privacy and security of the user's sensitive data.
  • the method for implementing a smart device system includes steps 201 to 204 in addition to the steps described in FIG. 1, For simplicity of description, the steps described in FIG. 1 are omitted.
  • the implementation method of the smart device system further includes:
  • the smart device When the smart device receives the user's device use request, the smart device obtains the user input data in the device use request.
  • the user can perform corresponding operations on the smart device.
  • the smart door lock can be opened by means of fingerprint input, that is, the fingerprint data is input into the smart door lock through the sensor.
  • the user input data is fingerprint data of the user.
  • the smart device converts the fingerprint data into a hash value, and generates a composite key according to the hash value and the device ID of the smart device as the information to be queried.
  • the smart device may use a hash algorithm to hash the user input data to generate a hash value, where the hash algorithm may be any safe and reliable hash algorithm, such as SHA256, State Secret SM3, or State Secret SM4.
  • the hash algorithm may be any safe and reliable hash algorithm, such as SHA256, State Secret SM3, or State Secret SM4.
  • the query function of the smart contract is called to query whether there is a value corresponding to the composite key in the private chain, and receive the query result returned by the smart contract; where the query result is used to indicate whether the smart device is allowed to be used for operation.
  • the smart device determines whether the operation to be used is allowed according to the query result of the smart contract.
  • the smart device when the query result indicates that the query is successful, the smart device is allowed to be used for operation, and when the query result indicates that the query fails, the smart device is not allowed to be used for operation.
  • the user's input data is obtained and the corresponding information to be queried is generated, and the corresponding query is performed by invoking the query function of the smart contract, so that the smart device determines whether to query the smart contract
  • the operation is allowed to be used, thereby preventing the smart device from being controlled by the criminals.
  • the method for implementing a smart device system includes steps 301 to 304 in addition to the steps described in FIG. 1, For simplicity of description, the steps described in FIG. 1 are omitted.
  • the implementation method of the smart device system further includes:
  • the client obtains the initial password set by the user.
  • the user after deploying multiple smart devices to form a private chain network, the user needs to initialize the smart devices so that the smart devices can be used later.
  • the password input mode can also be used to initialize the smart device.
  • the user can use the mobile phone client to set the door unlock password of the smart door lock to initialize the smart door lock.
  • the preset algorithm is a hash algorithm.
  • the client may use a hash algorithm to hash the initial password to generate an initial hash value
  • the hash algorithm may be any safe and reliable hash algorithm, such as SHA256, State Secret SM3, or State Secret SM4.
  • Each smart device upgrades the smart contract according to the user's confirmation operation.
  • the smart contract is upgraded.
  • the second initial information generated by the initial password set by the user is written into the private chain through a smart contract, when the user needs to change the initial password, it can be achieved by upgrading the contract.
  • the method for implementing a smart device system includes steps 401 to 403 in addition to the steps described in FIG. 3, For simplicity of description, the steps described in FIG. 3 are omitted.
  • the implementation method of the smart device system further includes:
  • the smart device When the smart device receives the user's device use request, the smart device obtains the user's input password.
  • the user can perform corresponding operations on the smart device.
  • the smart door lock can be opened by using a password input method, that is, the password is input into the smart door lock through the mobile client.
  • the smart device invokes the verification function of the smart contract, performs a hash operation on the input password through the smart contract, and compares the hash operation result with the hash operation result of the initial password written in the smart contract to generate a verification result; wherein ,
  • the verification result is used to indicate whether the smart device is allowed to be used for operation.
  • the verification result is used to indicate whether the smart device is allowed to be used for operation.
  • the smart device when the verification result indicates that the verification is passed, the smart device is allowed to be used for operation, and when the verification result indicates that the verification is not passed, the smart device is not allowed to be used for operation.
  • the user's input password is obtained, and the corresponding verification is performed by calling the verification function of the smart contract, so that the smart device determines whether the operation is permitted according to the verification result returned by the smart contract. This can prevent smart devices from being controlled by criminals.
  • An embodiment of the present invention provides a method for controlling a smart device.
  • the method is applied to a smart device in a private chain network.
  • the private chain network is composed of smart devices and other smart devices, and a smart contract issued by a user is deployed in the private chain network.
  • Methods include:
  • the smart device When the smart device receives the user's device use request, the smart device obtains the user input data in the device use request.
  • this step is the same as step 201, and will not be repeated here.
  • this step is the same as step 202, and will not be repeated here.
  • this step is the same as step 203 and will not be repeated here.
  • 504 Determine whether the operation to be used is allowed according to the query result of the smart contract.
  • this step is the same as step 204, and will not be repeated here.
  • the user's input data is obtained and corresponding information to be queried is generated, and the corresponding query is performed by calling a smart contract, so that the smart device determines whether it is allowed to be used according to the query result returned by the smart contract
  • the operation can thereby prevent the smart device from being controlled by criminals.
  • An embodiment of the present invention provides a method for controlling a smart device.
  • the method is applied to a smart device in a private chain network.
  • the private chain network is composed of smart devices and other smart devices, and a smart contract issued by a user is deployed in the private chain network.
  • the method includes:
  • the smart device When the smart device receives the user's device use request, the smart device obtains the user's input password;
  • this step is the same as step 401, and will not be repeated here.
  • the smart contract uses a preset algorithm to generate the corresponding information for the input password, and compares the information with the initial information corresponding to the device ID of the smart device, where the initial information is based on the user setting Generated by the initial password;
  • this step is the same as step 402, and will not be repeated here.
  • this step is the same as step 403 and will not be repeated here.
  • the user's input password is obtained, and the corresponding verification is performed by calling the smart contract, so that the smart device determines whether the operation is permitted according to the verification result returned by the smart contract, thereby avoiding Smart devices are controlled by criminals.
  • FIG. 6 is a schematic flowchart of the smart door lock password opening process provided by the present invention. The user enters the password and the smart door lock calls the verification function of the smart contract to perform the corresponding verification. When the verification is successful, the smart door lock allows the door opening operation.
  • FIG. 7 is a system block diagram of a smart device system provided by the present invention.
  • the system may include a client and multiple smart devices connected to a local area network.
  • the multiple smart devices form a private chain network, as shown in FIG. 7, for ease of description.
  • the following describes the blockchain-based smart device system with only the client 710 and the smart device 710 located in the private chain network, where the smart device 720 is configured as any one of multiple smart devices:
  • Client 710 includes:
  • the contract issuing module 711 is used to publish smart contracts with multiple functions to each smart device of the private chain network;
  • the smart device 720 includes:
  • the contract acquisition module 721 is used to separately acquire smart contracts issued by users with other smart devices in the private chain network;
  • the contract deployment module 722 is used to deploy the smart contract to the private chain network after confirmation by the user;
  • the data obtaining module 723 is used to obtain user sensitive data in the device initialization request when the user's device initialization request is received;
  • the first generating module 724 is configured to generate corresponding first initial information for user sensitive data
  • the contract calling module 725 is used to call the added function of the smart contract to write the first initial information into the private chain.
  • the data obtaining module 723 is also used to obtain user input data in the device use request when the user's device use request is received;
  • the first generating module 724 is also used for user input data to generate corresponding information to be queried;
  • the contract calling module 725 is also used to call the query function of the smart contract to query the information to be queried in the private chain;
  • the smart device 720 also includes:
  • the operation control module 726 is used to determine whether the smart device is allowed to be operated according to the query result of the smart contract.
  • the user sensitive data is the initial fingerprint data input by the user
  • the first generation module 724 is specifically used to:
  • the value value is generated according to the startup mode of the smart device and the entry time of the initial fingerprint data
  • the contract calling module is specifically used for:
  • the user input data is the user's fingerprint data
  • the first generation module 724 is specifically used to:
  • the contract calling module 725 is also specifically used for:
  • the query result is used to indicate whether the smart device is allowed to be used for operation.
  • client 710 further includes:
  • the password obtaining module 712 is configured to obtain an initial password set by the user by the client when receiving a device initialization request from the user for the smart device;
  • the second generation module 713 is used to generate corresponding second initial information for the initial password using a preset algorithm
  • the information writing module 714 is used to write the device ID and the second initial information of the smart device into the verification function of the smart contract corresponding to the preset algorithm to update the smart contract;
  • Smart devices also include:
  • the contract upgrade module 727 is used to upgrade the smart contract according to the user's confirmation operation.
  • the data acquisition module 723 is also specifically used to:
  • the contract calling module 725 is also specifically used for:
  • the preset algorithm is a hash algorithm.
  • contract calling module 725 is also specifically used for:
  • the delete function of the smart contract is called to delete the user's sensitive data.
  • a person of ordinary skill in the art may understand that all or part of the steps for implementing the above embodiments may be completed by hardware, or may be completed by a program instructing associated hardware.
  • the program may be stored in a computer-readable storage medium
  • the storage medium mentioned above may be a read-only memory, a magnetic disk or an optical disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

La présente invention concerne le domaine technique de la technologie de chaîne de blocs, et concerne ainsi un procédé de mise en œuvre pour un système de dispositif intelligent, un procédé et un système de commande de dispositif intelligent. Le procédé consiste à : former un réseau de chaîne privée pour une pluralité de dispositifs intelligents connectés à un réseau local ; chaque dispositif intelligent obtenant respectivement un contrat intelligent ayant une pluralité de fonctions qui est émis par un utilisateur, et déployant le contrat intelligent vers le réseau de chaîne privé après avoir été authentifié par les utilisateurs ; lorsqu'un dispositif intelligent reçoit une demande d'initialisation d'un utilisateur, le dispositif intelligent obtient des données sensibles de l'utilisateur dans la demande d'initialisation de dispositif et génère des premières informations initiales correspondantes pour les données sensibles de l'utilisateur ; et appeler une fonction d'ajout du contrat intelligent pour écrire les premières informations initiales dans la chaîne privée. Selon les modes de réalisation de la présente invention, les données sensibles de l'utilisateur acquises par le dispositif intelligent sont stockées sur la chaîne privée au moyen du contrat intelligent, ce qui permet d'éviter la fuite de données sensibles de l'utilisateur et de garantir pleinement la confidentialité et la sécurité des données sensibles de l'utilisateur.
PCT/CN2019/106753 2018-11-15 2019-09-19 Procédé de mise en œuvre pour système de dispositif intelligent, procédé et système de commande de dispositif intelligent WO2020098382A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA3160728A CA3160728A1 (fr) 2018-11-15 2019-09-19 Procede de mise en ƒuvre pour systeme de dispositif intelligent, procede et systeme de commande de dispositif intelligent

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811359532.9 2018-11-15
CN201811359532.9A CN109660514B (zh) 2018-11-15 2018-11-15 一种智能设备系统的实现方法、智能设备控制方法及系统

Publications (1)

Publication Number Publication Date
WO2020098382A1 true WO2020098382A1 (fr) 2020-05-22

Family

ID=66112020

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/106753 WO2020098382A1 (fr) 2018-11-15 2019-09-19 Procédé de mise en œuvre pour système de dispositif intelligent, procédé et système de commande de dispositif intelligent

Country Status (3)

Country Link
CN (1) CN109660514B (fr)
CA (1) CA3160728A1 (fr)
WO (1) WO2020098382A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113347185A (zh) * 2021-06-01 2021-09-03 永旗(北京)科技有限公司 一种基于区块链的物联网设备管理方法

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109660514B (zh) * 2018-11-15 2020-06-09 苏宁易购集团股份有限公司 一种智能设备系统的实现方法、智能设备控制方法及系统
CN110716745A (zh) * 2019-10-21 2020-01-21 星矿科技(北京)有限公司 一种使用区块链和智能合约来构建去中心社区的方法
CN111046078B (zh) * 2019-11-11 2023-09-05 京东科技信息技术有限公司 基于区块链的征信查询方法、装置和电子设备
CN112637274A (zh) * 2020-12-04 2021-04-09 山西特信环宇信息技术有限公司 锥体区块链终端及其接入方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106796685A (zh) * 2016-12-30 2017-05-31 深圳前海达闼云端智能科技有限公司 区块链权限控制方法、装置及节点设备
US20170310653A1 (en) * 2016-04-22 2017-10-26 Sony Corporation Client, server, method and identity verification system
CN107820690A (zh) * 2017-08-21 2018-03-20 达闼科技成都有限公司 信息选取方法、装置、电子设备及计算机可读存储介质
CN108647966A (zh) * 2018-05-09 2018-10-12 深圳市融讯科技有限公司 一种基于区块链的数据交互方法及装置
CN109660514A (zh) * 2018-11-15 2019-04-19 苏宁易购集团股份有限公司 一种智能设备系统的实现方法、智能设备控制方法及系统

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107341702B (zh) * 2017-03-08 2020-06-23 创新先进技术有限公司 一种业务处理的方法及装置
US20180315055A1 (en) * 2017-05-01 2018-11-01 International Business Machines Corporation Blockchain For Issue/Defect Tracking System
CN107622385A (zh) * 2017-08-28 2018-01-23 南京邮电大学 一种基于区块链智能合约的数字作品发行方法
KR101881045B1 (ko) * 2017-11-15 2018-07-23 주식회사 가온시스템 블록체인에 기반한 의료정보 제공 시스템 및 방법
CN108460290A (zh) * 2017-12-27 2018-08-28 江苏省卫生统计信息中心 一种电子健康档案管理系统及方法
CN108171430B (zh) * 2017-12-29 2021-12-07 深圳市轱辘车联数据技术有限公司 数据处理方法、车载设备以及ubi分析中心服务器
CN108364180A (zh) * 2018-01-31 2018-08-03 复旦大学 一种基于区块链的共享电力交易方法
CN108494090B (zh) * 2018-04-16 2020-10-02 华东师范大学 一种基于区块链的能源网联智能装置及系统
CN108717861B (zh) * 2018-04-16 2020-07-14 上海交通大学 一种基于区块链的医疗数据共享方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170310653A1 (en) * 2016-04-22 2017-10-26 Sony Corporation Client, server, method and identity verification system
CN106796685A (zh) * 2016-12-30 2017-05-31 深圳前海达闼云端智能科技有限公司 区块链权限控制方法、装置及节点设备
CN107820690A (zh) * 2017-08-21 2018-03-20 达闼科技成都有限公司 信息选取方法、装置、电子设备及计算机可读存储介质
CN108647966A (zh) * 2018-05-09 2018-10-12 深圳市融讯科技有限公司 一种基于区块链的数据交互方法及装置
CN109660514A (zh) * 2018-11-15 2019-04-19 苏宁易购集团股份有限公司 一种智能设备系统的实现方法、智能设备控制方法及系统

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113347185A (zh) * 2021-06-01 2021-09-03 永旗(北京)科技有限公司 一种基于区块链的物联网设备管理方法

Also Published As

Publication number Publication date
CN109660514A (zh) 2019-04-19
CN109660514B (zh) 2020-06-09
CA3160728A1 (fr) 2020-05-22

Similar Documents

Publication Publication Date Title
WO2020098382A1 (fr) Procédé de mise en œuvre pour système de dispositif intelligent, procédé et système de commande de dispositif intelligent
US10454927B2 (en) Systems and methods for managing relationships among digital identities
EP3605475A1 (fr) Procédé de communication sécurisée basé sur un système de verrouillage de porte intelligent et système de verrouillage de porte intelligent associé
CN112214745B (zh) 经认证的外部生物特征读取器和验证设备
US11556617B2 (en) Authentication translation
KR102540090B1 (ko) 전자 장치 및 그의 전자 키 관리 방법
CN113168476A (zh) 操作系统中个性化密码学安全的访问控制
CN111868726B (zh) 电子设备和电子设备的数字钥匙供应方法
WO2006043904A1 (fr) Systeme a code d'acces unique
CN111209558B (zh) 基于区块链的物联网设备身份认证方法以及系统
WO2013075419A1 (fr) Procédé de gestion de droit d'utilisation d'une fonction, et terminal mobile
US20220245631A1 (en) Authentication method and apparatus of biometric payment device, computer device, and storage medium
WO2012089057A1 (fr) Procédé d'authentification et dispositif électronique
KR102301742B1 (ko) 키패드 없는 스마트 도어락 키 등록 및 사용방법과 그 출입관리 시스템
JP2001148697A (ja) 低信頼性のチャネルを介して情報を通信する方法
KR20080087917A (ko) 일회용 비밀번호 생성방법과 키 발급 시스템 및 일회용비밀번호 인증 시스템
EP3794485B1 (fr) Procédé et noeud de réseau permettant de gérer l'accès à une chaîne de blocs
US20200218819A1 (en) Sfs access control method and system, sfs and terminal device
CN116192483A (zh) 认证鉴权方法、装置、设备及介质
Zhang et al. Security enforcement model for distributed usage control
JP2020521341A (ja) 識別情報に基づく暗号鍵の管理
KR20220072657A (ko) 가상 블록체인이 결합된 이중 블록체인에 기반한 IoT 기기 플랫폼 보안 구축 방법 및 IoT 기기 플랫폼 보안 구축 시스템
US20090327704A1 (en) Strong authentication to a network
CN109584421A (zh) 一种基于国产安全芯片的智能门锁认证管理系统
JP2004206258A (ja) 多重認証システム、コンピュータプログラムおよび多重認証方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19885383

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19885383

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 3160728

Country of ref document: CA

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 13.01.2022)

122 Ep: pct application non-entry in european phase

Ref document number: 19885383

Country of ref document: EP

Kind code of ref document: A1