Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A block chain-based key management method, device and storage medium in CCN

A key management and blockchain technology, applied in the field of blockchain-based key management and computer-readable storage media, can solve problems such as excessive overhead, potential security risks, and malicious users, to ensure authenticity and integrity The effect of avoiding single point of failure

Active Publication Date: 2021-08-06
PEKING UNIV SHENZHEN GRADUATE SCHOOL
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Furthermore, based on the "endorsement" method, it is inevitable that some users will do evil, authenticate illegal users, and cause security risks
In addition, revoking a user requires all members to reach an agreement, which is too expensive

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A block chain-based key management method, device and storage medium in CCN
  • A block chain-based key management method, device and storage medium in CCN
  • A block chain-based key management method, device and storage medium in CCN

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0089] figure 1 The basic architecture of the blockchain-based key management system in the present invention is shown. refer to figure 1 , the system is divided into three layers from top to bottom, among which, the top layer (marked by the area surrounded by an oval) is the blockchain layer, which is composed of each independent trust domain administrator as a consensus node, which is used to store user A hash of the public key to guarantee the authenticity of the user's public key. The middle layer (marked by a triangle) is the user public key layer, which is used to verify the public key of the next layer; the bottom layer (marked by a square) is the device and application key layer.

[0090] In order to avoid a single point of failure, the present invention uses the blockchain composed of trust domain administrators as the starting point of trust, and each trust domain administrator serves as a consensus node. The blockchain is used to store the public key hashes of us...

Embodiment 2

[0152] refer to Figure 5 , which shows a flow chart of the steps of a blockchain-based key management method in a CCN of the present invention, which may specifically include:

[0153] Step 501, the user creates an authentication transaction, which includes the user's public key hash and user signature;

[0154] Step 502, the user sends the authentication transaction to the trust domain administrator of the trust domain where the user is located to apply for authentication, wherein the user refers to an ordinary node in the trust domain;

[0155] Step 503, the user receives the block height of the authentication transaction sent by the trust domain administrator, and writes the block height and transaction hash together into a public key bag;

[0156] In an alternative embodiment of the present invention, refer to Figure 6 , the above method also includes the following steps:

[0157] Step 504, the user creates a revocation transaction, the revocation transa...

Embodiment 3

[0161] refer to Figure 7 , which shows a flow chart of the steps of a blockchain-based key management method in a CCN of the present invention, which may specifically include:

[0162] Step 701, the trust domain administrator receives the authentication transaction sent by the user;

[0163] Step 702, judging whether the authentication transaction is legal;

[0164] Specifically, the judging whether the authentication transaction is legal includes:

[0165] The trust domain administrator verifies the user signature in the authentication transaction, and judges whether the user is a legal user in the trust domain, and if so, determines that the authentication transaction is legal; if not, confirms that the authentication transaction is illegal.

[0166] Step 703, when it is determined that the authentication transaction is legal, the trust domain administrator signs the authentication transaction, and broadcasts the signed authentication transaction to the block...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention provides a block chain-based key management method in CCN, including: the user creates an authentication transaction, and the authentication transaction includes the user's public key hash and user signature; the user sends the authentication transaction to The trust domain administrator of the trust domain where it is located applies for authentication; the user receives the block height of the authentication transaction sent by the trust domain administrator, and combines the block height with the transaction hash Write the public key bag. Based on the above scheme, the present invention implements a decentralized key management method, using blockchain to store the hash of the public key of the user in the trust domain, thereby effectively ensuring the authenticity and integrity of the user's public key. The embodiment of the present invention also provides a block chain-based key management device and a computer-readable storage medium in the CCN.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a block chain-based key management method, device and computer-readable storage medium in CCN. Background technique [0002] Content-Centric Networking (CCN) is a new information-centric network architecture system that provides content-based security design principles. This is completely different from the traditional IP network based on channel security (users and hosts need to encrypt communication channels at the application layer or session layer through SSL / TLS to ensure that data cannot be eavesdropped during transmission). CCN builds data authentication into the network layer, and the publisher binds and signs the content and content name together. In this way, each CCN package carries a digital signature binding content and name, and in order to verify the signature of a data package, the application can obtain the corresponding public key. However...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G06Q40/04
CPCG06Q40/04H04L9/3236H04L9/3239H04L9/3247H04L2209/56
Inventor 雷凯齐竹云楼君俊章奇超
Owner PEKING UNIV SHENZHEN GRADUATE SCHOOL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products