Smart terminal authentication management method

A smart terminal and authentication management technology, which is applied in the field of authentication and anti-counterfeiting based on blockchain technology, can solve problems such as non-standard use, inability to realize dynamic information authentication management, ownership of intelligent processes, and difficulty in appraising and trading the right to use, etc. To achieve the effect of enhancing reliability

Active Publication Date: 2018-05-18
浙江责联科技有限公司
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are disadvantages in these methods: it is easy to be physically copied, cannot achieve accurate traceability, and cannot realize authentication management of dynamic information (which can effectively prevent physical copying)
[0005] 1. Irregular use: Unable to identify counterfeit or fake products, and identification of different manufacturers or different models (including software versions) of the same manufacturer
[0006] 2. The certification of smart device results cannot be automated: once the result is in text form, it is easy to be tampered with, and it is necessary to manually check the entire process data for confirmation, which cannot reflect the advantages of smart results
[0008] 4. The results of different smart devices cannot be used mutually: As mentioned above, if the structured result data cannot be certified, the data between different smart devices cannot be mutually recognized or integrated, which will result in poor application effects of smart devices
[0010] 6. Intelligent achievements cannot be automatically traded with equipment and personnel, so the ownership and use rights of the intelligent process are difficult to evaluate and trade

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Smart terminal authentication management method
  • Smart terminal authentication management method
  • Smart terminal authentication management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] Embodiment 1: intelligent fire protection

[0035] At present, fire protection facilities mainly use anti-counterfeiting labels or various certification certificates (such as CCCF certification in China, UL certification in the United States, etc.).

[0036] Add a block chain interface module to the equipment, integrate the interface module with the original circuit system, and use it to collect the required data from the original equipment (such as the water pressure and water flow speed of the fire water system) to realize the Internet of Things interface. At the same time, an asymmetric key pair EK (EKpub, EKpri) is generated, in which the key EKpri is only stored locally for system authentication, and the public key EKpub can be directly accessed.

[0037] 1) Certification: There are two ways, one is manufacturer certification; the other is blockchain certification.

[0038] i) Manufacturer certification

[0039] It is realized by the two signature methods of manu...

Embodiment 2

[0049] Embodiment 2: smart camera

[0050]The block chain interface module (which can be in the form of software) is placed in the original circuit, and the data generated by the smart camera (such as face recognition results, behavior recognition results, etc.) can be obtained. At the same time, an asymmetric key pair EK (EKpub, EKpri) is generated, in which the key EKpri is only stored locally for system authentication, and the public key EKpub can be directly accessed.

[0051] 1) Certification: There are two ways, one is manufacturer certification; the other is blockchain certification.

[0052] i) Manufacturer certification

[0053] It is realized by the two signature methods of manufacturer's signature + device signature: the manufacturer's own MK (MKpub, MKpri) will pass relevant certification information (including product model, serial number, certification information, date of manufacture, etc., and can also include photos, etc.) ) using MD5 256 to generate a summa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a smart terminal authentication management method. Smart product counterfeiting prevention, product application process counterfeiting prevention and product smart interface process counterfeiting prevention are realized. In multiple signing modes and a blockchain mode, counterfeiting prevention authentication of information such as device manufacturer authentication information, device authentication information, device process data, technical intelligence items similar to a deep learning mechanism, transaction conditions and the like, and execution authentication andrecording of related processes are realized. The credibility of a smart terminal and the outside world (comprising devices, software and users) is realized and the automatic transaction reliability isimproved.

Description

technical field [0001] The invention relates to the technical field of product anti-counterfeiting and product application process anti-counterfeiting, in particular to an authentication and anti-counterfeiting method based on block chain technology. Background technique [0002] At present, equipment certification is mainly through: tags (including RFID and other electronic tags), online certification, encrypted database certification, etc. There are disadvantages in these methods: it is easy to be physically copied, cannot realize accurate traceability, and cannot realize authentication management of dynamic information (which can effectively prevent physical copying). [0003] In addition, with the increasing popularity of intelligent devices such as face recognition, behavior recognition, intelligent robots, and automatic driving, the certification management of manufacturers of these devices, embedded software, and the certification management of intelligent processing ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08G06Q30/00G06F21/44
CPCG06F21/44G06Q30/0185H04L9/0861H04L9/3247
Inventor 裘炅马哲雄
Owner 浙江责联科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products