MUMBAI, India, Jan. 2 -- Intellectual Property India has published a patent application (202541122480 A) filed by Malla Reddy (MR) Deemed to be University; Malla Reddy Vishwavidyapeeth; Malla Reddy University; Malla Reddy Engineering College For Women; and Malla Reddy College Of Engineering And Technology, Malkajgiri, Telangana, on Dec. 5, 2025, for 'secure access control system for distributed iot devices.'

Inventor(s) include Dr. Deena Babu Mandru; Mrs. Sheetal Kulkarni; Dr. Ranjith Uppula; Dr. Nune Srinivas Rao; and M. Vazralu.

The application for the patent was published on Jan. 2, under issue no. 01/2026.

According to the abstract released by the Intellectual Property India: "The architecture is secure access control (SAC) system which is created to address authentication, authorisation and data integrity in distributed Internet of Things (IoT) systems. The system proposes a decentralized system that adds identity checks and permission control on the models and still provides end-to-end encryption and in-time integrity checks. Unlike centralized security designs that construct multiple single points of vulnerability, the offered design eliminates trust between fabric connections of interdependent nodes using a lightweight consensus protocol and hierarchical key management. The IoT node consists of a distinctive cryptographic identity, which is generated through one asymmetric key pair with locally validated credentials. The access requests are evaluated on multi-layer validation engine involving behavioral analysis and context validation and real time policy enforcement. There is a time stamping of the digestive transactions among devices to exclude spoofing, replay attacks, and/or unauthorized configuration changes. It also possesses an adaptive intrusion detection layer which observes network behavior in order to identify an anomaly pattern and also dynamically detaches the victims in order to continue its operation flow. Functions Since the system can be configured to engage in secure interactions with a low cost of computation (performance testing), it was determined that it could be utilized in the case of large scale resource-constrained IoT systems. The architecture is robust in supporting confidentiality, accuracy in authentication and the resistance against distributed attacks that aid to offer trust based interoperability between the industrial, urban and consumer IoT ecosystems."

Disclaimer: Curated by HT Syndication.