Block chain based equipment certification method, certification server and user equipment
An authentication server and device authentication technology, applied in the direction of instruments, data processing applications, payment systems, etc., can solve problems such as attacks, third-party hijacking of authentication information, and inability to guarantee the uniqueness of user equipment, so as to improve efficiency and simplify the verification process. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0023] Example one
[0024] figure 2 It is a flowchart of a device authentication method based on blockchain provided in the first embodiment of the present application. Such as figure 2 As shown, the method includes:
[0025] Step S210: Receive the device binding request sent by the user equipment, generate device binding information corresponding to the device binding request, and provide the device binding information to the user equipment.
[0026] In the embodiment of the present invention, in order to ensure the uniqueness of the user equipment that initiates the authentication request, before performing the authentication operation, the binding information of the user equipment needs to be stored in the smart contract of the blockchain. Therefore, it is necessary to generate corresponding and unique device binding information for the device binding request sent by the user device, and return the device binding information to the user device, so that the user device can send...
Example Embodiment
[0036] Example two
[0037] image 3 It is a flowchart of a device authentication method based on blockchain provided in the second embodiment of the present application, and the execution subject of the method is preferably an authentication server. Such as image 3 As shown, the method includes:
[0038] Step S310: Set up a smart contract, and broadcast the smart contract to the blockchain.
[0039] Specifically, the preset smart contract is broadcast to the blockchain network in the form of a blockchain transaction, and after verification by most nodes, the smart contract reaches a consensus on the blockchain network, and then the smart contract can run On the blockchain network. Among them, the structure of the above smart contract is divided into three parts, namely the smart contract blockchain account address, the data part and the program part, and the program part of the smart contract can achieve three functions, one is to write data to the data part , Which is used to p...
Example Embodiment
[0051] Example three
[0052] Figure 4 It is a flowchart of a blockchain-based device authentication method provided in the third embodiment of this application, Figure 4 The execution subject of the method shown may be user equipment. Such as Figure 4 As shown, the method includes:
[0053] Step S410: Send a device binding request to the authentication server, and receive the device binding information returned by the authentication server according to the device binding request.
[0054] In this embodiment, in order to ensure the uniqueness of the user equipment that initiates the authentication request, the user equipment needs to be bound before the authentication operation is performed, and the binding information of the user equipment is stored in the smart contract of the blockchain . Therefore, after the user device sends a binding request to the authentication server, the authentication server needs to generate corresponding and unique device binding information for the...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap