Block chain based equipment certification method, certification server and user equipment

An authentication server and device authentication technology, applied in the direction of instruments, data processing applications, payment systems, etc., can solve problems such as attacks, third-party hijacking of authentication information, and inability to guarantee the uniqueness of user equipment, so as to improve efficiency and simplify the verification process. Effect

Active Publication Date: 2017-02-22
JIANGSU PAYEGIS TECH CO LTD +1
View PDF7 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the inventor found in the process of implementing the present invention that at least the methods in the prior art have the following problems: in the traditional device authentication system, only the authentication inf

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain based equipment certification method, certification server and user equipment
  • Block chain based equipment certification method, certification server and user equipment
  • Block chain based equipment certification method, certification server and user equipment

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0023] Example one

[0024] figure 2 It is a flowchart of a device authentication method based on blockchain provided in the first embodiment of the present application. Such as figure 2 As shown, the method includes:

[0025] Step S210: Receive the device binding request sent by the user equipment, generate device binding information corresponding to the device binding request, and provide the device binding information to the user equipment.

[0026] In the embodiment of the present invention, in order to ensure the uniqueness of the user equipment that initiates the authentication request, before performing the authentication operation, the binding information of the user equipment needs to be stored in the smart contract of the blockchain. Therefore, it is necessary to generate corresponding and unique device binding information for the device binding request sent by the user device, and return the device binding information to the user device, so that the user device can send...

Example Embodiment

[0036] Example two

[0037] image 3 It is a flowchart of a device authentication method based on blockchain provided in the second embodiment of the present application, and the execution subject of the method is preferably an authentication server. Such as image 3 As shown, the method includes:

[0038] Step S310: Set up a smart contract, and broadcast the smart contract to the blockchain.

[0039] Specifically, the preset smart contract is broadcast to the blockchain network in the form of a blockchain transaction, and after verification by most nodes, the smart contract reaches a consensus on the blockchain network, and then the smart contract can run On the blockchain network. Among them, the structure of the above smart contract is divided into three parts, namely the smart contract blockchain account address, the data part and the program part, and the program part of the smart contract can achieve three functions, one is to write data to the data part , Which is used to p...

Example Embodiment

[0051] Example three

[0052] Figure 4 It is a flowchart of a blockchain-based device authentication method provided in the third embodiment of this application, Figure 4 The execution subject of the method shown may be user equipment. Such as Figure 4 As shown, the method includes:

[0053] Step S410: Send a device binding request to the authentication server, and receive the device binding information returned by the authentication server according to the device binding request.

[0054] In this embodiment, in order to ensure the uniqueness of the user equipment that initiates the authentication request, the user equipment needs to be bound before the authentication operation is performed, and the binding information of the user equipment is stored in the smart contract of the blockchain . Therefore, after the user device sends a binding request to the authentication server, the authentication server needs to generate corresponding and unique device binding information for the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a block chain based equipment certification method, a certification server and user equipment, and relates to the technical field of equipment certification. The method includes: receiving an equipment binding request sent by the user equipment, generating equipment binding information corresponding to the equipment binding request, and providing the equipment binding information to the user equipment; acquiring a first process running result generated by a smart contract, and sending a binding success message to the smart contract according to the first process running result; receiving an equipment certification request sent by the user equipment, and returning equipment certification information to the user equipment according to the equipment certification request; acquiring a second process running result generated by the smart contract, and performing certification on the user equipment according to the second process running result. Therefore, the block chain smart contract is used for saving the equipment binding information to make the equipment information not tampered, and the problems in the prior art are solved.

Description

technical field [0001] The present invention relates to the technical field of equipment authentication, in particular to a block chain-based equipment authentication method, authentication server and user equipment. Background technique [0002] Device authentication refers to the process of confirming the qualification of a device in a computer and computer network system, so as to determine whether the device has access and use rights to a certain resource, so that the access policy of the computer and network system can be implemented reliably and effectively. [0003] Such as figure 1 As shown, in the traditional device authentication system, assuming that the authentication server A needs to confirm the qualification of the user device B, the main process is as follows: 1.1, the user device B sends a device authentication request to the authentication server A; 1.2, the authentication server A returns the authentication information To user equipment B, wherein the aut...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06Q20/40
CPCG06Q20/401H04L63/0876
Inventor 汪德嘉郭宇王少凡柴泉
Owner JIANGSU PAYEGIS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products