Internet of Things identity authentication method based on blockchain

A technology of identity authentication and authentication method, which is applied in the direction of electrical components, transmission systems, etc., can solve problems such as the inability to decentralize the authentication process, the inability to support multi-factor authentication, and access to delivery authentication scenarios, etc., to achieve both ease of use and security Sexuality, quickness, high efficiency and accuracy

Active Publication Date: 2018-02-09
FUDAN UNIV
View PDF11 Cites 130 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it does not submit the process of entity identity authentication to the blockchain for execution through smart contracts, and cannot decentralize the authentication process. At the same time, the patent cannot support authentication scenarios including multi-factor authentication, access transfer, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things identity authentication method based on blockchain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0037] exist figure 1 On the left side, Entity B wishes to access a resource on Entity C via transitive access, and Entity A wishes to access a resource on Entity C.

[0038] (1) Entity B first uses the address of its own blockchain node and the address of entity A as authentication information to call the identity authentication smart contract;

[0039] (2) After receiving the request, the smart contract will apply for access to the decentralized cloud storage system to obtain the conditions for accessing entity C. After cloud storage returns the access conditions set by entity C, the smart contract compares the access conditions with the identity authentication information sent by entity B. figure 1 If the smart contract finds that entity C allows the entity represented by the address of entity B to access the resources of entity C, then the smart contract will g...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of identity authentication, and specifically provides an Internet of Things identity authentication method based on a blockchain. The basic steps of the Internet of Things identity authentication method provided by the invention are as follows: an entity calls an intelligent contract by means of an own key to accomplish the registration in an identity authentication system; each entity can call the intelligent contract to set an access strategy so as to limit the access of other entities to the entity and to form a trust network of the Internet of Things; when one entity accesses the data of the other entity, the entity needs to apply for a token from the intelligent contract to obtain the access qualification, and the intelligent contract checks whether the entity initiating the access has the access qualification according to the access strategy set by the accessed entity in the trust network between the entities, and if yes, the intelligent contract generates the token and returns the token to the entity initiating the access; or otherwise, the intelligent contract returns token application failure information. By adoption of the method provided by the invention, a centralized authority mechanism in an identity authentication process is removed, malicious tampering of records of identity authentication and data access is prevented, a strategy execution result is not manually manipulated, and a fair, transparent and credible execution environment is provided for the identity authentication of the entities in the Internet of Things.

Description

technical field [0001] The invention belongs to the technical field of identity authentication, and in particular relates to an identity authentication method based on a block chain. Background technique [0002] In recent years, with the rapid development of IoT technology, the number of devices connected to the network has also exploded. According to Gartner's statistics, there were 6.4818 billion IoT devices in the world in 2016, and in 2017 the scale of the IoT has reached 8.3806 billion, an increase of nearly one-third a year. With the rapid increase of the scale of the Internet of Things, the identity authentication of the devices in the Internet of Things is also getting more and more attention. [0003] Most of the current mainstream identity authentication methods are centralized, and there are many defects in these methods. First, centralized servers are vulnerable to attack. After a server attack, the server may be paralyzed, data leakage or identity authentica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L63/0807H04L63/083H04L63/0861H04L63/0876H04L63/101H04L67/12
Inventor 韩伟力郭泽卿金波王晓阳
Owner FUDAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products