A network equipment integrity protection method under the distributed environment

A technology of integrity protection and distributed environment, applied in the field of network equipment integrity protection, it can solve the problems of security, high centralization of certificate authority, hidden dangers, etc.

Active Publication Date: 2018-12-18
深圳市引方科技有限公司
View PDF5 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0028] Aiming at the technical problems that the certificate authorization center is highly centralized and there are security risks in the existing Internet of Things device information integrity protection method based on public key cryptography identity authentication, the present invention provides a network device integrity protection in

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network equipment integrity protection method under the distributed environment
  • A network equipment integrity protection method under the distributed environment
  • A network equipment integrity protection method under the distributed environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0085] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0086] Such as figure 2 As shown, the present invention provides a method for protecting the integrity of network equipment in a distributed environment, comprising the following steps:

[0087] The first step is to deploy a blockchain network based on the open source project Hyperledger Fabric. The blockchain network includes clients, submission nodes and consensus nodes. The endorsement policy is specified when the client initializes the smart contract in the submission node. The endorsement policy specifies a subset of the submission nodes to perform the endorsement function. The submission node that performs the endorsement function is also called an endorsement node. Such as image 3 As shown, the blockchain network includes multiple clients, multiple submission nodes and multiple consensus nodes, the submission nodes are conn...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Aiming at the existing information integrity protection methods based on public key cryptography authentication for Internet of Things equipment, The certificate authorization center is highly centralized and has the technical problem of security hidden trouble. The invention provides a network equipment integrity protection method under the distributed environment. The method comprises the following steps: first, a block chain network is deployed based on an open source project Hyperledger Fabric; 2, the Internet of things device is registered on the block chain network; 3, the client periodically verifies the device information and detects whether the device information is damaged; 4, the process is ended. The invention utilizes the non-tampering characteristic of the block chain to permanently store the device information, and checks the device information periodically to detect whether the key information of the device is tampered with or not, thereby achieving the purpose of protecting the integrity of the device information and solving the security hidden danger caused by decentralization.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to a method for protecting the integrity of network equipment in a distributed environment in the Internet of Things. Background technique [0002] Usually, the integrity of data depends on trust in the system center or third-party entities, such as the master node of the system, the central database, the person in charge of the system, the administrator of the database, etc. Once the above-mentioned system center is no longer trusted ( For example, if the administrator is bribed or the database is invaded), the integrity of the data will be destroyed and it will be difficult to detect. [0003] The existing methods for protecting the information integrity of IoT devices are based on public key infrastructure (PKI, Public Key Infrastructure), which utilizes the characteristics of public key cryptography, through a third-party trusted organization, that is, a certificate au...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06H04L9/32
CPCH04L9/3247H04L63/0428H04L63/08H04L63/123H04L63/1416H04L67/10
Inventor 邓宇平
Owner 深圳市引方科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products