Trusted device management method based on decentralized network

A device management and decentralization technology, applied in data exchange network, secure communication device, user identity/authority verification, etc., can solve problems such as low security protection strength and lack of flexibility in management

Active Publication Date: 2017-06-30
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF1 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This management method requires the management node and the managed node to be online and establish a connection at the same time,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted device management method based on decentralized network
  • Trusted device management method based on decentralized network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and / or steps.

[0035] Any feature disclosed in this specification, unless specifically stated, can be replaced by other alternative features that are equivalent or have similar purposes. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.

[0036] (1) Device management network construction

[0037] All nodes participating in device management form a peer-to-peer network including nodes with different roles according to the P2P protocol; each node forwards management information or management information blocks to its adjacent nodes according to role requirements and policies;

[0038] Nodes in the network have a public-private key pair and an address generated by the public key.

[0039] The management node uses a cryptographic algorit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of device networking management, and provides a trusted device management method based on a decentralized network. According to the method, a distributed decentralized network is adopted, and coupling between a management device and a managed device is eliminated. Encrypted management commands and management data are utilized. The managed device actively or passively acquires a management instruction from the distributed network, and furthermore feedback information is written, thereby realizing asynchronous communication between the management device and the managed device. A target node according to the invention acquires management information through a lightweight node, wherein the lightweight node filters local node information; the information which matches the address of the target node is forwarded to the target node; and the target node verifies an information signature by means of a source node public key, decrypts a session key through a local private key and decrypts a message, thereby acquiring management information and processing.

Description

technical field [0001] The invention relates to the field of device network management, in particular to a trusted device management method based on a decentralized network. Background technique [0002] Network equipment, security equipment, Internet of Things equipment and other equipment usually use networked management methods to monitor, configure, and control equipment. The current management method generally communicates directly between the management equipment and the managed equipment, and provides authentication and encryption through passwords. Provide communication data protection. This management method requires the management node and the managed node to be online and establish a connection at the same time, which cannot be satisfied in many application scenarios, lacks flexibility in management, and has low security protection strength. Contents of the invention [0003] The technical problem to be solved by the present invention is to provide a trusted de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L29/06H04L29/08H04L9/32
CPCH04L9/3247H04L41/042H04L41/14H04L63/0442H04L67/104
Inventor 郝尧白健安红章赵越吴开均
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products