Internet of things device supply chain trust system management method, computer program, computer

A technology of IoT devices and management methods, which is applied in the fields of cyberspace security, blockchain, and the Internet of Things, can solve the problem that the effective link of the central server is difficult to guarantee, and the low power consumption and lightweight computing requirements of the Internet of Things devices cannot meet the processing requirements. Computational overhead of decryption, difficulty in adjustment and adaptation, etc.

Active Publication Date: 2018-04-10
XIDIAN UNIV
View PDF5 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] To sum up, the problems existing in the existing technology are: the management of the session key in the current trust establishment method of the IoT device supply chain will be very difficult; the effective link with the central server will be difficult to guarantee; the Internet of Things The low power consumption an

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of things device supply chain trust system management method, computer program, computer
  • Internet of things device supply chain trust system management method, computer program, computer
  • Internet of things device supply chain trust system management method, computer program, computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0090] Embodiment 1, data storage method and data structure. The specific content is as follows:

[0091] (1) Overall design

[0092] In the ROM of the IoT device, store: the ID of the IoT device, the K of the IoT device itself R ,Security code.

[0093] In the SSD of the IoT device, store: the top-level public key of the owner of the IoT device, anti-counterfeiting code, and others.

[0094] In the RAM of the IoT device, store: the owner's top-level public key, the blockchain.

[0095] The structure of each block in the blockchain is as follows image 3 shown.

[0096] The description of each field in the block is as follows:

[0097] IoT Device ID: A unique identifier for an IoT device.

[0098] Administrator ID: Support multiple administrators to manage multiple IoT devices.

[0099] Administrator's public key: assign a public-private key pair to each administrator, and write the administrator's public key into the block. This field is used to establish trust betwe...

Embodiment 2

[0119] Embodiment 2, trust relationship migration. The specific content is as follows:

[0120] Trust migration occurs when the ownership of IoT devices changes, mainly when the manufacturer sells the IoT devices to the purchaser. The interactive process of trust relationship migration is as follows: Figure 4 shown.

[0121] Figure 4 The specific interaction content of the protocol shown is as follows:

[0122] ①: {IoT device ID, N A , transfer identifier, {△ 1} sig}.

[0123] ②: {IoT device ID, N B , transfer identifier} KP-制造商 .

[0124] ③: {N A N B ,KP-purchaser,{△ 2} sig} KP-物联网设备 .

[0125] Among them, N A , N B Both are random numbers; "KP-Purchaser" means the public key of the purchaser; △ 1 Indicates Hash (IoT device ID, N A , transfer identifier), that is, for {IoT device ID, N A , transfer identifier} for hash processing; △ 2 means Hash( KP-Purchaser), ie to { KP-Purchaser} for hash processing; {△} Sig means to sign △ with the private key o...

Embodiment 3

[0132] Embodiment 3, after purchasing the IoT device, the purchaser needs to deploy the IoT device to the service network. Deploying an IoT device means first writing the blockchain into the IoT device memory, as this is the carrier of trust. At this time, it is divided into two situations, corresponding to solving different problems.

[0133] (1) The applicable situation of the embodiment is that a large number of IoT devices are still in the base at this time and have not yet been deployed. To write the blockchain into the memory of the IoT device in this case, the blockchain can be generated by the server blockchain management module, and the server communication module is responsible for writing the blockchain into the memory of the IoT device.

[0134] combine image 3 Interpret each field in the blockchain block.

[0135] IoT device ID: directly read from the IoT device ROM;

[0136] Administrator ID: The purchaser can designate an administrator for the IoT device ac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of internet of things, block-chain and cyberspace security, and discloses a internet of things device supply chain trust system management method, a computer program and a computer. The production phase of an internet of things device, wherein internet of things device manufacturers interact with internet of things devices to write necessary informationinto the internet of things devices; internet of things device transaction phase, wherein the transfer of trust relationships between the internet of things devices and different internet of things device owners is completed; and internet of things device deployment phase, wherein the internet of things device owners deploy the internet of things devices to business networks. The method providessupports for secure communications between the internet of things devices; when the block-chain occupies a large storage space, a server relaxes the capacity of the block-chain in the internet of things device networks; the method achieves the identity authentication between an administrator and a plurality of internet of things devices, achieves the mutual trust between the internet of things devices, and supports a plurality of administrators to manage different internet of things devices; and the computing and storage costs of the internet of things devices are relatively low.

Description

technical field [0001] The invention belongs to the technical fields of the Internet of Things, blockchain, and cyberspace security, and in particular relates to a management method, a computer program, and a computer for a supply chain trust system of an Internet of Things device. Background technique [0002] At present, a new round of global technological revolution and industrial transformation continues to deepen, the international industrial structure is reshaping at an accelerated pace, and innovation has become the primary driving force leading development. In this round of transformation, information technology is the field with the most concentrated R&D investment, the most active innovation, the most extensive application, and the greatest radiation-driven effect in the world. It is the high ground for global technological innovation competition and the leading force leading a new round of transformation. Blockchain technology is a widely recognized technical fram...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/45G06F21/44G06F21/31H04L29/06H04L29/08
CPCG06F21/31G06F21/44G06F21/45H04L63/062H04L63/0876H04L67/12
Inventor 李兴华任彦冰刘海王运帷梁辰雒彬马建峰
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products