Credibility verification method based on DNSSEC and DANE protocols

A verification method and a credible technology, applied in the network field, can solve the problems of forged barcodes of commodity labels and fraudulent labels, and achieve the effect of preventing abuse.

Active Publication Date: 2014-07-16
CHINA INTERNET NETWORK INFORMATION CENTER
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, for the problem that the barcode of the product label may be forged, add the corresponding verification server, or add the encryption card with counting function to record the history of the product label being queried, so as to solve the problem of criminals using forged labels to deceive repeatedly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credibility verification method based on DNSSEC and DANE protocols
  • Credibility verification method based on DNSSEC and DANE protocols
  • Credibility verification method based on DNSSEC and DANE protocols

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The following three specific examples are used to illustrate the content of the invention. Let's first introduce an example of dealer anti-counterfeiting. The anti-counterfeiting process is as follows: Figure 4 As shown, it can be divided into two stages: registration and query. In the registration stage, the dealer generates a pair of public and private keys, and submits the public key and the dealer's registration number to the national authority (here, it is assumed to be "National Internet of Things Identification Management Public Service Platform", the same below), The online identity management public service platform creates a TLSA resource record for the dealer, which contains the dealer's public key information. In the inquiry stage, the dealer anti-counterfeiting APP first scans the dealer logo, and converts the obtained dealer logo (here 5936) into a domain name (here 5936.gsh.niot.cn), and then reports to the National Internet of Things Logo Management T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a credibility verification method based on DNSSEC and DANE protocols. The method includes the steps that first, a key pair is generated for each object to be verified, a public key is submitted to an authoritative server, a private key is stored on a set encryption card and cannot be copied; second, a sub-domain name is allocated to the object to be verified in the DNS domain by the authoritative server, a DANE resource record for storing the public key of the object to be verified is added for the objected to be verified, and signature is performed through the public key; third, the identification of the object to be verified is acquired by a user through a credibility verification client and converted into a domain name, and then a query request is initiated to the DNS domain of the authoritative server; fourth, the corresponding DANE resource record is returned through the authoritative server; fifth, the user acquires the identification of the object to be verified and sends the identification of the object to be verified to the encryption card so that the identification of the object to be verified can be encrypted; sixth, the ciphertext is decrypted by the credibility verification client through the public key in the returned resource record, and then the object to be verified is verified. Through the credibility verification method based on the DNSSEC and DANE protocols, the anti-fake capacity is greatly improved.

Description

technical field [0001] The invention relates to a trusted verification method based on DNSSEC and DANE protocols in the Internet of Things, and belongs to the technical field of networks. Background technique [0002] An important application of the Internet of Things is the traceability and anti-counterfeiting of commodities. The current common practice in the industry is to assign a unique label code (such as an RFID tag) to each commodity to realize the binding of commodities and labels; Relevant information is associated with the tag, so as to achieve the purpose of querying commodity-related information through the tag. [0003] Although these means in the prior art can play the role of commodity anti-counterfeiting to a certain extent, there are still some technical loopholes. First of all, although a mechanism is provided to locate the corresponding official website based on the label on the product and then query the relevant information of the product, the official...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L9/40
Inventor 孔宁邓光青沈烁刘冰黄向阳
Owner CHINA INTERNET NETWORK INFORMATION CENTER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products