Method for registration and verification of Internet of Things identity based on blockchain

A technology of identity registration and verification methods, applied in the blockchain field, can solve problems such as incompleteness, huge amount of transaction data, privacy leakage, etc.

Active Publication Date: 2019-04-16
ZHEJIANG WANLI CONSTR ENG
View PDF7 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

First of all, traditional databases are centralized, which is prone to privacy leakage and data loss; second, due to the huge amount of transaction data in the Internet of Things, the transaction information and identity information are stored on the same b

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for registration and verification of Internet of Things identity based on blockchain
  • Method for registration and verification of Internet of Things identity based on blockchain
  • Method for registration and verification of Internet of Things identity based on blockchain

Examples

Experimental program
Comparison scheme
Effect test

example

[0077] Simulate user A to initiate a transaction to user B, transaction sender A, transaction receiver B, and the transaction is verified by the entire network nodes.

[0078] First, if figure 2 As shown, A reads and inputs its identity information through MAC, uses "MAC address + password" as a private key, and the public key corresponding to the private key is generated by an elliptic curve, and then uses the HASH256 hash algorithm to convert the public key into an identity Address, and uploaded to the identity registration chain, A completes the identity registration; then, if image 3 As shown, A uses the HASH256 hash algorithm to hash the transaction information, generates a hash summary, which is recorded as Y1, and encrypts it with a private key to generate a digital signature; A initiates a transaction, and sends the signature, hash summary Y1 and public The key is sent to the whole network; if Figure 4 As shown, the nodes of the whole network jointly verify the tr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of blockchains, and discloses a method for registration and verification of an Internet of Things identity based on a blockchain. The method comprises thefollowing steps: in an Internet of Things transaction, a sender reads and enters his identity information through a MAC, completes identity registration, and deposits identity information into an identity registration chain; the sender hashes the transaction information, generates a hash digest, records the hash digest as Y1, and encrypts the same with a private key to generate a digital signature; the sender initiates the transaction, and sends the signature, the hash digest Y1, and the corresponding public key to the whole network; nodes of the whole network verify the transaction information; and all nodes further determine whether the sender has been registered, and upload the transaction to the transaction chain if passing the two-factor verification. The method enables the identity of the transaction on the Internet of Things to be proved to be correct without revealing the identity of the trader through the blockchain technology, thereby avoiding the leakage of the trader's identity information during the transaction.

Description

technical field [0001] The invention belongs to the technical field of block chains, and in particular relates to a method for registering and verifying identity of the Internet of Things based on block chains. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: [0003] As the third industrial revolution and a new direction for the development of future social interconnection technology, the Internet of Things has brought great changes to people's production and life after the Internet. The development and application of the Internet of Things technology has achieved remarkable results in recent years. A large number of sensors and equipment are connected and combined with the Internet to realize intelligent management and operation. At the same time, as the scale of the Internet of Things continues to expand, the security and privacy issues of the Internet of Things have become one of the threats faced by the I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L9/32H04L9/30H04L9/06G06Q20/38
CPCG06Q20/3825G06Q20/3827H04L9/0643H04L9/3066H04L9/3247H04L63/0876H04L65/1073H04L67/104H04L67/12
Inventor 郑忠龙林飞龙陈中育马永进孙广华丁月娇
Owner ZHEJIANG WANLI CONSTR ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products