Method and system for decentralized digital authentication
11657665 · 2023-05-23
Assignee
Inventors
Cpc classification
H04L63/10
ELECTRICITY
H04W4/80
ELECTRICITY
G07C2209/02
PHYSICS
H04L9/088
ELECTRICITY
H04L9/3242
ELECTRICITY
G06Q2240/00
PHYSICS
G07C9/00309
PHYSICS
H04L63/108
ELECTRICITY
H04L9/3268
ELECTRICITY
G07C9/00563
PHYSICS
International classification
H04L9/32
ELECTRICITY
H04L9/08
ELECTRICITY
Abstract
A method and system for digital authentication is disclosed, in which an owner device associated with a smart lock receives identity information of a user device requesting access to the smart lock. The owner device registers first contract information of the smart contract, for granting access of the smart lock to the user device, on a decentralized trust network, and sends second contract information about the smart contract to the user device. The second contract information comprises validation information of the smart contract indicating an un-validated information of the second contract information. The user device validates the received second contract information against the first contract information on the decentralized trust network, and authenticates the user device with the smart lock using the validated second contract information.
Claims
1. A method for digital authentication, comprising the following steps: receiving, by an owner device associated with a smart lock, identity information of a user device requesting access to the smart lock; initializing the smart lock, by the owner device associated with the smart lock, wherein initializing the smart lock by the owner device comprises a mutual exchange of public keys of the owner device and the smart lock; registering, by the owner device, first contract information of a smart contract, for granting access of the smart lock to the user device, on a decentralized trust network; sending, by the owner device, second contract information about the smart contract to the user device, wherein the second contract information comprises validation information of the smart contract indicating an un-validated information of the second contract information; validating, by the user device, the received second contract information against the first contract information on the decentralized trust network, causing the validation state of the second contract information to change from the un-validated state to a validated state; authenticating, initiated by the user device, the user device with the smart lock using the validated second contract information.
2. The method according to claim 1, further comprising the following step, before registering, by the owner device, first contract information of the smart lock on the decentralized trust network, registering, by the owner device, information, which indicates that the smart lock is associated with the owner device, on the decentralized trust network.
3. The method according to claim 1, wherein the identity information of the user device comprises a public key of the user device and wherein the smart contract comprises information regarding the public keys of the smart lock and the user device and the smart contract is signed using a private key of the owner device.
4. The method according to claim 2, further comprising the step of, before registering the first contract information on the decentralized trust network, generating, by the owner device, the smart contract for the user device for granting access of the smart lock to the user device.
5. The method according to claim 1, wherein the authentication of the user device with the smart lock comprises mutual digital signature validation.
6. The method according to claim 1, further comprising the step of, after authenticating the user device with the smart lock, sending, by the user device, an un-lock instruction to the smart lock, thereby causing the smart lock to unlock.
7. The method according to claim 1, wherein the smart lock has only a local, short distance data connection, and that during authentication of the user device with the smart lock, authentication data is transferred to the smart lock in the form of a token corresponding to the validated second contract information, wherein the smart lock uses the token to verify that access of the smart lock is granted to the user device by the owner device.
8. The method according to claim 1, wherein the smart lock has an internet connection and access to the decentralized trust network, and wherein it is validated, by the smart lock, on the decentralized trust network that access of the smart lock is granted to the user device by the owner device.
9. The method according to claim 1, wherein a connection between the owner device and the user device, with said connection used for sending the second contract information, is a peer-to-peer connection established via a centralized service.
10. The method according to claim 1, wherein the owner device and the user device are each part of the decentralized trust network and synchronize with the decentralized trust network.
11. The method according to claim 1, wherein the owner device as well as the user device each have an account on the decentralized trust network, through which they can access a server of the decentralized trust network, wherein transactions are created and/or signed locally on the respective device and executed on the server which synchronizes with the decentralized trust network.
12. A system for digital authentication, the system comprising: a mobile owner device, a smart lock associated with the owner device and a mobile user device, wherein the owner device is configured to: receive identity information of the user device, wherein the user device is requesting access to the smart lock; initialize the smart lock, by the owner device associated with the smart lock, wherein the smart lock initialized by the owner device comprises a mutual exchange of public keys of the owner device and the smart lock; register first contract information of a smart contract for granting access of the smart lock to the user device on the decentralized trust network; and send second contract information about the smart contract to the user device, wherein the second contract information comprises validation information indicating an un-validated state of the smart contract; wherein the user device is configured to: receive the second contract information from the owner device; validate the received second contract information with the decentralized trust network, causing the validation state of the smart contract comprised by the second contract information to change from an un-validated state to a validated state; and authenticate the user device with the smart lock using the second contract information in the validated state.
13. The system according to claim 12, wherein the smart lock only has a short distance data connection and wherein the user device is further configured to authenticate the user device with the smart lock by sending authentication data to the smart lock in the form of a token corresponding to the validated second contract information and wherein the smart lock is further configured to verify that access of the smart lock is granted to the user device by the owner device using the token.
14. The system according to claim 12, wherein the smart lock is configured to connect to an internet and to the decentralized trust network, and wherein the smart lock is further configured to validate on the decentralized trust network that access of the smart lock is granted to the user device by the owner device.
15. The system according to claim 12, wherein the owner device as well as the user device each have an account on the decentralized trust network, through which they can access a server of the decentralized trust network, wherein transactions are created and/or signed locally on the respective device and executed on the server which synchronizes with the decentralized trust network.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) Reference is now made more particularly to the drawings, which illustrate the best presently known mode of carrying out the invention and wherein similar reference characters indicate the same parts throughout the views.
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
DETAILED DESCRIPTION OF THE DRAWINGS
(17)
(18) Different scenarios of the discussed system are described below, wherein the scenarios differ, primarily with respect to the internet and Blockchain connectivity as well as the Blockchain synchronization of the distinct devices of the system.
(19) The scenarios described below have at least in common that a key and/or smart contract for opening the smart lock 4 by the user device 3 is generated and digitally signed by the owner device 1. Sharing of the key, smart contract or respectively generated token happens by way of the centralized service 2 and/or a (virtual) p2p connection established by way of the centralized service 2 and most if not all of the communication between the devices, in particular information relating to the key, token or smart contract, is registered on the Blockchain network 5 for auditing purposes. Authentication between either mobile device 1, 3 and the smart lock 2 is performed over a short distance communication channel such as Bluetooth or other bi-directional communication channels which are supported by both devices such as, e.g., audio, video, QR codes, AirDrop, WIFI, and involves mutual digital signature validation.
(20) Overall, we distinguish an “online” and an “offline” solution, where offline and online refers to an internet connectivity of the asset or respective smart lock. “Offline”, herein refers to scenarios where the smart lock is never or almost never connected to the internet. For example, in an “offline” scenarios, the smart lock may not have the capability and necessary technical features to independently connect to the internet, but it may be temporarily connected to the internet through another device with which it pairs up using a wire of wireless short distance data connection. “Online”, on the other hand, refers to scenarios where the smart lock is connected to the internet most of the time or at least has the capability to independently connect to the internet.
(21)
(22)
(23) Asset Setup:
(24) Before discussing different scenarios for granting (temporary) access, by the owner device to the user device for a sharable asset, it is first described how an asset or smart lock is initialized or set up.
(25) S401: The mobile phone 41 or other mobile device which is to be associated to the respective asset 44, which has smart locking capabilities, first connects to the asset, e.g. using a Bluetooth connection.
(26) S402: At this point the firmware of the asset 44 is blank as far as digital keys are concerned and in setup mode. In this state the firmware is preferably not yet paired with an owner and has neither a private nor public key.
(27) S403: The asset 44 may then, optionally, provide its firmware version, such as a version number, build and/or unique ID (for example a serial number) to the mobile phone 41.
(28) S404: Based on the firmware version, the mobile phone 41 determines whether a firmware update is available and/or necessary and, if necessary, the firmware of the asset 44 may be updated.
(29) S405: When the firmware update is complete, the asset 44 sends a respective message to the mobile phone 41.
(30) S406: The mobile phone 41 then initiates the setup procedure.
(31) S407: During the setup procedure, the asset 44 is configured to generate an asymmetric key pair, such as RSA keys. Additionally, the internal clock of the asset may be synchronized with the clock of the mobile phone and it is furthermore possible that additional settings, such as a auto-lock after a specified time period, are initialized.
(32) S408: After the asset 44 has generated its keys, it sends its own public key to the mobile phone 41.
(33) S409: The mobile phone 41 also generates a respective asymmetric key pair such as RSA keys. Alternatively, the mobile phone 41 could also use a previously generated key pair.
(34) S410: The mobile phone 41 then sends its public key to the asset 44.
(35) S411: The asset 44 permanently stores at least the public key received from the mobile phone 41 in order to be able to later identify said mobile phone 41 as being the owner associated with the asset 44.
(36) S412: The mobile phone 41 may then send additional setup information such as a name of the asset 44 and/or the current time.
(37) S413: The asset 44 replies to said messages by acknowledging receipt and stores the received information.
(38) S414: To finalize the setup procedure, the mobile phone 41 then sends a respective finalise-setup-message to the asset 44.
(39) S415: The asset 44 acknowledges the finalise-setup-message.
(40) S416: After receiving the finalise-setup message, the asset 44 changes to operational mode and may, optionally, reset itself in order to apply all changes made during the setup procedure.
(41) S417: To test whether the setup was successful, the mobile phone 41 and the asset 44 may test the authentication procedure by exchanging challenges and responses for mutual authentication. Preferably, if the authentication test fails, the asset should remain in setup mode and the setup procedure should be restarted. Furthermore, preferably, there is an option to reset the lock using a hidden button or through a respective app.
(42) S418: The asset 44 is ready for use.
(43) In the following, different scenarios and implementation specifications for offline solutions are discussed, where the smart lock and/or asset operate offline, i.e. without a connection to the internet and/or Blockchain network.
(44) Scenario 1:
(45) According to a first scenario, as illustrated in
(46) Data necessary for opening (or other respective actions) of the smart lock 504 is transmitted to the smart lock 504 in the form of a token 506 which represents a smart contract to which the owner device 501 and the user device 503 have agreed with respect to the asset protected by the smart lock 504.
(47) Before such a token for granting access to the smart lock 504 can be generated and shared by the owner device 501, the owner device needs to register the smart lock 504 on the Blockchain network 505, so that identity information regarding the smart lock 504 and identity information regarding the owner device 501 are associated with each other in such a way that ownership of the smart lock 504 by the owner device 501 is registered on the Blockchain. This registration may be achieved by creating a respective smart contract, for example by using a predefined template or through a respective user interface. The smart contract and/or related information, may then be published on the Blockchain network through a transaction.
(48) The owner device then needs to receive information regarding the user device 503, including at least the public key of the user device 503. The communication between the owner device 501 and the user device 503 is implemented via a p2p connection established through the cloud server 502. The owner device 501 and the user device 503 communicate with the cloud server 502 through a connection 507 based on a REST architecture and using the HTTP protocol.
(49) After the owner device 501 and the user device 503 (or their respective owner and user) have reached an agreement regarding the sharing of the asset protected by the smart lock 504, the owner device generates a respective smart contract and/or, which is registered on the Blockchain network for, for example, auditing purposes and for verifying the permission of the user and/or the owner. If the lock is internet connected and is part of the Blockchain the lock may verify the user and its permission rules against the smart contract on the Blockchain network directly.
(50) The token 506 comprises information regarding the rules and permissions associated with the specific sharing agreement, the smart lock 504, the owner device 501 and the user device 503.
(51) While it is possible that the smart contract and the token 506 are separate entities containing different information, in this scenario, the token contains all relevant information regarding the smart contract, so that the terms “token” and “smart contract” may be used interchangeably.
(52) The token 506 is then transmitted to the user device 503 through a p2p connection established via the cloud server 502, which supports p2p encryption. Options for implementing the communication and, in particular, the transmission of the token from the owner device to the user device are described below with respect to
(53) After the user device 503 receives the token 506 or a notification regarding the token 506, the user device 503 verifies the token 506 against the Blockchain to make sure that the token 506 represents the correct information. This verification may also alter the token 506 in such a way that the previously unvalidated token becomes validated, wherein only a validated token 506 may be used in order to access the smart lock 504. How precisely the token may be validated can be described in the smart contract. For example, once the owner adds the user to an allowed users list in the smart contract, the smart contract is in a wait state—waiting user confirmation. Once the user confirms the rules of the contract by making a transaction to the smart contract, a flag indicating that user allowance is complete is enabled and access is enabled. The user cannot fake the transaction as the transaction should be signed by the user's private key. The smart contract will enable the flag and do the flag modifications only if the transaction is coming (signed) from the user with proper account. The validation may also be achieved by downloading additional necessary information from the Blockchain network after the initial notification regarding the token 506 has been received by the user device 503. The validation procedure also serves to verify that the token 506 has been received and accepted by the user device 503 and it registered on the Blockchain network, that the user device 503 has received and/or validated the token 506. This is required also for legal reasons, so that the smart contract has been accepted by both parties, similarly to both signatures being required on a paper contract. Additional implementation details regarding the receipt and validation of the token by the user device are described below with respect to
(54) According to scenario 1, the mobile devices 501, 503 are participants of the Blockchain network 505, i.e. the owner device 501 as well as the user device 503 each hold all necessary information locally as a synchronized copy of the Blockchain ledger and each respective mobile device 501, 503 receives incremental updates which are synchronized throughout the Blockchain network 505.
(55) When a token or smart contract of the owner device 501 is shared, e.g. sent to, the user device 503, the user device 503 receives a push notification sent by the owner device 501 via a p2p connection with the user device 503. The user device 503 needs to be synchronized with the latest version of the Blockchain before the user device 503 can receive and validate the information of the key, token or smart contract against the Blockchain, which is done locally on the user device 503 using the locally stored copy of the Blockchain ledger.
(56) In one example of scenario 1, the token 506 itself is generated locally by the owner device 501 and corresponds to the respective smart contract. In another example, the token 506 and smart contract may comprise different data. According to scenario 1, the token 506 is encrypted using the public key of the smart lock 504 as well as using the public key of the user device 503. Furthermore, the token 506 is digitally signed by the owner device 501. Thus, the token 506 comprises the public key of the user device 503, the public key of the smart lock 504, the local ID, such as for example the Bluetooth ID, of the smart lock 504 and the Blockchain address of the smart lock and the smart contract Application Binary Interface (ABI). The token 506 may furthermore comprise additional rules and restrictions which are part of the smart contract, such as, for example, a rental period, how often and/or with which frequency access may be repeated, whether the key can be re-shared with others, whether the ownership rights change sue to the smart contract and/or whether an ability to transfer the owner is provided by the smart contract.
(57) The smart contract usually contains information regarding the smart lock 504 such as a Bluetooth ID of the smart lock 504, so that the user device 503 can send the token 506 to the smart lock 504. After receiving the token 506, before the smart lock 504 performs any actions such as opening the smart lock 504, an authentication of the smart lock 504 with the user device 503 is necessary. The authentication is based on mutual validation of cryptographic signatures and is further described below with respect to
(58) Thus, according to scenario 1 the token 506 provides an encapsulated message from the owner device 501 to the smart lock 504, which is transmitted via the user device 503. The owner device 501 is associated to the smart lock 504 and has the necessary digital key (i.e. the private key of the owner device 501) to control the actions of the smart lock 504. Said token 506 which is used for accessing an asset without an internet connection can be described as a self-contained collection of data which the smart lock 504, which only has access to short distance data connections, needs in order to validate the user device 503 against the smart contract and also in order for the smart lock 504 to obtain details of the smart contract such as rules regarding access properties (when, for how long is access permitted).
(59) After the token 506 has been verified and a secure Bluetooth connection has been established between the user device 503 and the smart lock 504, a command, such as a command to open the smart lock 504, may be sent from the user device 503 to the smart lock 504, causing the smart lock 504 to unlock wherein “unlocking” may either be a mechanical action, such as a motor which physically moves a bolt of a door, or an electronic or even virtual action through which access to a previously (mechanically, electronically or virtually) locked entity is achieved.
(60) Scenario 2:
(61) According to a slightly different alternative scenario 2, as illustrated in
(62) As in scenario 1, the smart lock 604 does not have internet connection and only has short distance data connection such as Bluetooth radio 608 and the data is transferred to the smart lock 604 in the form of a token 606, which contains the same or similar data as discussed above with respect to scenario 1.
(63) The smart lock 604 is initially set up by the owner device 601. Details regarding an implementation of the setup procedure are discussed above with respect to
(64) Similarly to scenario 1, the token 606 is generated by the owner device 601 for the user device 603, which may include, for example, the public key of the smart lock 606 and/or the public key of the user device 603 and which may furthermore be signed using the private key of the owner device 601 is then registered with the Blockchain network 605 by the owner device 601 using the Blockchain account of the owner device 601 for accountability and auditing purposes.
(65) Differently from scenario 1, the owner device 601 and the user device 603 are not themselves a part of the Blockchain network 605 and do, in scenario 2, not locally synchronize with changes made to the Blockchain. Rather the owner device 601 as well as the user device 603 each have a Blockchain account, though which they can access information stored on the Blockchain network 605 through the cloud server 602, which serves as a proxy server or a cloud infrastructure which synchronizes with the Blockchain network 605. Furthermore, the cloud server 602 or another server provides the necessary infrastructure for p2p connection between mobile devices such as the owner device 601 and the user device 603 in addition to providing an interface for the mobile devices for interacting with the Blockchain network 605. In general, the proxy server does not need to access the Blockchain network in order to establish a p2p connection.
(66) In order to interact with the Blockchain network 605, each mobile device has a Blockchain account through which said mobile device may access the Blockchain network 605. If the owner device 601 and/or user device 603 does not locally synchronize with the Blockchain, the respective device may instead request and access information regarding the Blockchain network 605, including information regarding smart contracts and respective tokens, via a cloud service interface. This means that transactions are created and signed locally, but forwarded for execution to the cloud server 602. The cloud server 602 then executes the respective transaction on the Blockchain network 605 on behalf of the mobile device, which has the same effect as if the transaction had been executed locally on a mobile device which synchronizes with the Blockchain network 605 itself. In particular, the cloud server 602 is synchronized with the latest blocks from the blockchain network, which is necessary in order for the cloud server 602 to successfully execute the respective transaction and provide notification about the progress of the transaction to the respective mobile device.
(67) When the token, or some information regarding the token, is sent to the user device 603 by the owner device 601, by way of the cloud infrastructure the user device 603 receives push notification, preferably encrypted push notification, from the owner device 601. The push notification may contain a token or part of a token as further discussed below with respect to
(68) The authentication between the user device 603 and the smart lock 604 also happens in the same manner as discussed above with respect to scenario 1, i.e. using mutual digital signature validation. After the smart lock 604 has verified that the user device 603 is the same as the user device 603 indicated by the smart contract or token, the smart lock 604 then accepts action commands from the user device 603 according to the rules and restrictions specified within the token.
(69) Application scenarios 1 and 2 are thus based on the assumption that the smart lock does not have a connection to the internet but rather only has local, short distance mobile connection, for example by using a Bluetooth radio or NFC.
(70) In both scenarios 1 and 2, the communication between, on the one hand, the mobile devices, i.e. the owner device as well as the user device, and, on the other hand, the cloud infrastructure my be based on a REST architecture and the HTTP protocol.
(71)
(72) During an initial setup process of the smart lock 74, the owner device 71 and the smart lock 74 exchange their public keys which are later used for verifying digital signatures and for encrypting messages. The setup of the smart lock 74, which is described in greater detail with respect to
(73) After the setup of the smart lock 74 but prior to token creation, a smart contract is agreed to between the owner device and the user device, wherein the smart contract specifies the IDs of the involved parties (user ID, owner ID as well as a smart lock or asset ID).
(74) In step S701, the owner device 71 registers information regarding the smart contract on the Blockchain network, including the public key of user device, the rental period (including start and end time) and the Bluetooth ID of the smart lock/asset. In Step S702 the user device 73 approves the smart contract and may also provides its own public key to the Blockchain, if the user device has not already done so before, where it can be accessed by the owner device 71.
(75) The token is then created by the owner device and registered on the Blockchain network. The token contains information regarding the smart contract and is encrypted by the public key of the user device, the public key of the smart lock and is signed by the private key of the owner device.
(76) In particular, the owner device sets a token flag (Step S703) to indicate that the token is ready for download by sending push notification (Step S704) to the user device. The push notification may be digitally signed by the private key of the owner device 71 in order to confirm authenticity of the push notification. The user device 73 confirms the receipt of the push notification and checks the validity of the token against the Blockchain (Step S705). The user device 73 furthermore approves the token flag (Step 706) and may download additional token information over a secure channel and using his Blockchain account for accountability. This step serves, on the one hand, for the user device to obtain the token and, on the other hand, to confirm that the token has, indeed been obtained by the user device, which creates additional security for the owner of the asset.
(77) The user then sends the validated token to the lock using the UUID of the lock as indicated by the token (Step S707) and the lock approves access (Step S708). The message exchange between the user device and the asset is also described below with respect to
(78)
(79) S801: The user device 83 knows the public security keys of the owner device as well as the smart lock of the asset 84. Said public keys can be easily obtained through a directory of public keys or from the smart contract or token.
(80) S802: Additionally, the user device 83 knows, by default, its own private key.
(81) S803: The smart lock of the asset 84, at the same time, has knowledge regarding the public key of the owner device, and, S804, knows its own private key by default.
(82) S805: The user device 83 approaches the smart lock of the asset 84 and, S806, contacts the smart lock of the asset using the Bluetooth ID of the smart lock of the asset 84.
(83) S807: The smart lock of the asset 84 responds to the Bluetooth connection and the two devices pair up using Bluetooth radio.
(84) S808: The user device 83 creates a challenge in order to verify whether this is the right smart lock of the asset.
(85) S809: The user device 83 sends the challenge over Bluetooth to the smart lock of the asset 84.
(86) S810: The smart lock of the asset 84 signs the challenge using its private key.
(87) S811: The smart lock of the asset 84 returns the signed challenge as a proof to the user device over Bluetooth.
(88) S812: The user device 83 uses the public key of the smart lock of the asset 84 to verify that this is the right asset 84.
(89) S813: The user device 83 creates an encrypted Bluetooth (such as TLS, SSL) channel for the further communication with the smart lock of the asset 84.
(90) S814: The user device 83 sends the token to the smart lock of the asset 84 over the encrypted Bluetooth channel.
(91) S815: The smart lock of the asset 84 can confirm that the token was created by the owner device using the owner devices public key and the smart lock of the asset 84 then knows the public key of the correct user device from the smart contract.
(92) S816: The smart lock of the asset 84 creates and sends a challenge for the user device in order to confirm the identity of the user device.
(93) S817: The user device 83 encrypts the challenge using its own private key and sends the signed response. Upon receiving the signed response, the smart lock of the asset 84 can confirm that this is the correct user device.
(94) S818: The asset 84 can now verify the identity of the mobile phone using the received information.
(95) S819: Afterwards the user device 83 can send action instructions such as “open” or “close” instructions to the smart lock of the asset 84.
(96) S820: The smart lock of the asset 84 responds by performing the respective action and providing access to the user or the user device 83.
(97)
(98)
(99) As in
(100) In the following, online solutions for providing access to a smart lock are discussed, i.e. scenarios where the smart lock in connected to the internet and may directly receive and/or access information from a cloud server and/or the Blockchain network. If the smart lock is connected to the internet, a token as discussed with respect to the offline scenarios 1 and 2 above is not necessary, as the smart lock can verify the received information directly against the Blockchain network.
(101) Scenario 3:
(102) According to implementation scenario 3, as illustrated in
(103) As in the other implementation scenarios, also in this implementation scenario 3, the smart lock 1104 is first setup by the owner device 1101 which preferably happens using a Bluetooth connection 1108 between the owner device 1101 and the smart lock 1104 in order to make the setup procedure as secure as possible.
(104) After the setup, the owner device 1101 receives a request from a user device 1103, with which the user device 1103 requests access to the smart lock 1104 and the respective asset. The request should at least comprise identity information about the user device 1103, such as the public key of the user device 1103.
(105) Afterwards a smart contract is generated by the owner device 1101 for the smart lock 1104 wherein the smart contract includes information, such as the public key, of the user device 1103. The smart contract is then registered on the Blockchain network 1105, which can be done locally on the owner device, as the owner device 1101 locally synchronizes with the Blockchain network 1105. During registration of the smart contract at least some metadata regarding the smart contract is transmitted to the Blockchain network 1105, preferably including at least one an identity information of the smart lock 1104, a public key of the owner device 1101 and/or the public key of the user device 1103.
(106) The cloud infrastructures 1102 role in scenario 3 is primarily to set up p2p connections between the owner device 1101 and the user device 1103 and to provide the necessary infrastructure for supporting p2p encryption.
(107) Once the smart contract or some information regarding the smart contract is sent to the user device 1103 by the owner device 1101, said user device 1103 receives a secureush notification from the owner device 1101. Push notifications are secured by the service provider. The user device 1103 needs to be synchronized with the latest changes from the Blockchain network in order to receive the smart contract information and validate said information against the Blockchain locally, as also discussed with respect to scenario 1 above.
(108) The information regarding the smart contract to which the user device 1103 has access after the validation of the information received from the owner device 1101 comprises at least a smart lock Blockchain address as well as the smart contract application Binary Interface (ABI).
(109) The mutual authentication between the user device 1003 and the smart lock 1004 as well as the passing of action messages for unlocking the smart lock 1004 by the user device 1003 is discussed in detail below with respect to
(110) Scenario 4:
(111) According to another alternative scenario 4, as illustrated by
(112) This scenario 4 is similar to scenario 2 with the additional feature that the smart lock may independently validate smart contract information with the Blockchain network, as further discussed below with respect to
(113) In order to increase the security in case of network breakdown, it is also possible to use hybrid scenarios in which network and/or blockchain connectivity of smart lock may usually be given, as discussed with respect to scenarios 3 or 4, but which can generate a temporary token as discussed under scenarios 1 and 2 in case the connectivity of the smart lock is interrupted, for example due to low resources.
(114) In each of the aforementioned scenarios, the sensitive information is preferably stored on the owner device and only meta information is shared with the blockchain network. When the key is shared with the user device, the relevant sensitive information is sent to the user device from the owner device through a p2p-connection, i.e. the sensitive information is may never be centrally stored. The digital key, token or smart contract may also be generated by the owner device and is stored locally on the owner device and, preferably, only less sensitive meta information about the key, token or smart contract is centrally stored. Preferably the stored meta information contains enough information to identify which device is allowed to use the lock under which circumstances, but the sensitive information necessary for actually unlocking the lock and gaining access to the respective property is only stored locally on the respective mobile devices. The validity of a digital key is furthermore dependent on the terms of the smart contract. For example the smart contract may specify a time or other constraints which need to be satisfied in order for the user device to gain access to the property protected by the smart lock.
(115) With each of the scenarios described above, it is possible to securely exchange digital keys and to securely validate user permissions. Which scenario is most appropriate may depend on specific environmental and hardware constraints.
(116)
(117) S1301: The user device 133 knows the Blockchain address of the smart lock of the asset as well as of the owner device associated with the smart lock of the asset. Said information is, for example, contained in the smart contract which the user device 133 has already received and validated before.
(118) S1302: Additionally, the user device 133 knows, by default, its own private key.
(119) S1303: The user device 133 approaches the asset and, S1304, contacts the smart lock of the asset using the Bluetooth ID of the smart lock of the asset 134.
(120) S1305: The smart lock of the asset 134 responds to the Bluetooth connection and the two devices pair up using Bluetooth radio.
(121) S1306: The user device 133 creates a challenge in order to verify whether this is the right asset.
(122) S1307: The user device 133 sends the challenge over Bluetooth to the smart lock of the asset 134.
(123) S1308: The smart lock of the asset 134 signs the challenge using its private key.
(124) S1309: The smart lock of the asset 134 returns the signed challenge to the user device 133 over Bluetooth.
(125) S1310: The user device 133 validates the information received from the smart lock of the asset against the information stored on the Blockchain regarding the smart lock of the asset. The validation is based on the signed response from the challenge. The challenge is being signed with the Blockchain private key and the asset can validate the BC address extracted from the signed message. The address can be validated against the smart contract.
(126) S1311: The user device has verified that this is the right asset.
(127) S1312: The smart lock of the asset creates and sends a challenge for the user device 133 in order to confirm the identity of the user device 133.
(128) S1313: The user device 133 encrypts the challenge using its own private key and sends the signed response. Upon receiving the signed response, the smart lock of the asset can confirm that the identity of the user device with which it is currently communicating over Bluetooth.
(129) S1314: The asset 134 knows the mobile phone's Blockchain address from the interaction with the mobile phone.
(130) S1315: The asset 134 then directly contacts the Blockchain network to validate whether this user device 133 has permission to access the asset 133. This respective information is stored on the Blockchain network with respect to the smart contract.
(131) S1316: The asset has now verified the identity of the mobile phone as well as that the permissions of the mobile phone.
(132) S1317: The use device can now send an action instruction such as an instruction to open the smart lock to the asset 134.
(133) S1318: The smart lock of the asset 134 responds by performing the respective action and providing access to the user or the user device 133.
(134) If the mobile phone is the owner device associated with the asset, the following steps are also possible:
(135) S1319: The mobile phone knows the asset's public key per default, as the mobile phone is the owner device of the asset 134.
(136) S1320: The asset 134 also knows the public key of its owner device and can, therefore confirm that the mobile phone is its owner device.
(137) S1321: An encrypted channel can then be created between the mobile phone and the asset 134.
(138) S1322: The mobile phone, which is the owner device of the asset, can then optionally send configuration data, for example to update the configuration of the asset 134.
(139) S1323: Also, the mobile phone, which is the owner device of the asset, can initiate a factory reset of the asset.
(140) The authentication between the user device and the smart lock of the asset of the online scenario of
(141) The authentication as discussed above with respect to
(142)
(143) The owner device 141 first performs the setup process 51401 with the lock 144, as described with respect to
(144) The owner device 141 then initiates to open the door (Step 1404) upon which cryptographic signatures are exchanged (Step 1405) between the owner device 141 and the lock 144. The lock 144 then uses the respective information regarding the smart contract 1403 from the Blockchain 145 to validate (Step 1406) that the owner device is allowed to access the smart lock. After the access authorization of the owner device 141 has been confirmed, the smart lock performs the requested “open” action (Step 1407).
(145)
(146) After setup of the lock 154 by the owner device 151, the owner device 151 creates a smart contract or key for sharing (Step 1501) for the user device and registers or updates (Step 1502) respective information regarding said smart contract on the Blockchain network 155.
(147) Afterwards the owner device 151 sends (step 1503) the key of smart contract or at least some information regarding the availability of the key or smart contract to the user device 153 via the cloud server 152, which first receives (Step 1504) the key and sends (step 1505) the respective push notification to the user device 153. The user device receives (Step 1506) the key and approves (Step 1507) the key, which causes key to be validated and also causes the smart contract information on the Blockchain to be updated (Step 1508). Using the validated key or smart contract information, the use device initiates (Step 1509) a door open procedure of the lock 154. The user device 153 and the lock 154 perform mutual digital signature validation (Step 1510) and the lock furthermore validates (Step 1511) against the contract information stored on the Blockchain (Step 1512) whether this user device 143 is allowed to access the lock 154. If all authentications and validations were successful, the lock then performs the requested open procedure (Step 1513).
(148) Notification Payload:
(149) The notification payload of sending the key, token or smart contract from the owner device to the user device, as, for example, discussed above with respect to Steps 1502-1506 of
(150) The payload of the notification, which is needed by the user device in order to access the respective lock comprises at least some of the following fields: To: is the recipient of the key From: is the sender of the key Address: is the Blockchain smart contract address of the asset ABI: is the Blockchain Smart Contract interface (required for importing a smart contracts into the recipient's wallet) Name: is the name of the key as specified by the sender (can be changed locally by recipient) Description: can be additional information in term of a message from the sender to the recipient Picture: Optional picture or icon to ease distinguishing the key among any other keys the users have in their application Btuuid: The uuid Bluetooth address of the asset to speed up the discovery of the device
(151) One example for setting the fields is shown below:
(152) TABLE-US-00001 { ″to″: ″+4915227*****″, ″abi″: <ABI OBJECT> ″to″: ″+4935227*****″, ″name″: ″BMW i8″, ″description″: ″Key to your new BMW″, ″address″: ″0×2cE224CaD729c63C5cDF9CE8F2E8B5B8181eC7B4″, ″picture″: ″bmwi8.jpg″, ″btuuid″: ″6E6B5C64-FAF7-40AE-9C21-D4933AF45C50″ }
(153) Due to the size of the payload above, the push notification could also contain only the name and sender from the payload. Once the receiving user device opens the notification message, the rest of the payload can be downloaded from the server and deleted from there afterwards. This also prevents the case when the message is not received due to application crash or other unpredicted situations. The message preferably exists on the server until it has been received by the other side.
(154) If the server executes the transaction on behalf of the user device, as discussed above with respect to scenarios 2 and 4, the sender payload to the server from the owner device contains Blockchain transaction, for example in JSON format, along with the push notification information provided above. The transaction is created and signed on the owner device. The server then executes this transaction, monitors the status of the transaction and after the transaction has finished, the server sends the push notification to the user device as mentioned above. The owner device also receives confirmation notification that the transaction has passed.
(155) If the Blockchain transaction is executed directly on the mobile phone, as described above with respect to scenarios 1 and 3, the owner device monitors the execution of the transaction and then sends the payload described above to the server so it can notify the receiving user device with a push notification.
(156) While four different implementation scenarios have been described above, said scenarios differ only with respect to the internet and/or Blockchain connectivity of the devices. The disclosure related to encryption, message passing and further features not specifically directed at Blockchain ad/or internet connectivity described with respect to any one of the scenarios may, therefore, is therefore also relevant with respect to the other scenarios.