Decentralized Internet of Things security authentication system, equipment registration and identity authentication method

A security authentication and decentralization technology, applied in user identity/authority verification, transmission system, electrical components, etc., can solve problems such as time delay, reduce resource consumption and processing time, realize dynamic change of topology structure, good business Effects of processing responses

Active Publication Date: 2019-05-17
安捷光通科技成都有限公司
View PDF12 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A blockchain-based autonomous interconnection method for Internet of Things devices (CN201711090605, public date: March 20, 2018) proposes a device-wide mutual trust based on the mutual trust relationsh

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decentralized Internet of Things security authentication system, equipment registration and identity authentication method
  • Decentralized Internet of Things security authentication system, equipment registration and identity authentication method
  • Decentralized Internet of Things security authentication system, equipment registration and identity authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] like figure 1 In the network deployment model shown, ENode (traditional gateway) builds a blockchain network responsible for maintaining the consistency of the ledger. The accounting node maintains the ledger through the following smart contracts, including: device management smart contracts, identity authentication service smart contracts and access control services Smart contract, SNode (Internet of Things equipment, user equipment) belongs to the P2P network responsible for specific production business; bookkeeping node ENode and light node SNode, product features: the operating system kernel running the blockchain node runs the modified IoT-oriented security Certified protocol stack; ENode is a general-purpose computer in the Internet, and these nodes jointly maintain the ledger; the difference between SNode and ENode is that it does not participate in the maintenance of the ledger, and only synchronizes some blocks to the local. IoT devices are light nodes in this s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a decentralized Internet of Things security authentication system, an equipment registration method and an identity authentication method, and belongs to the technical field ofInternet and network, the system comprises a bookkeeping node and a light node, and Internet of Things equipment in the system is the light node; and the system core module comprises an equipment certificate generation module, a key management module, a block chain basic service module, a security authentication service module and a visual management module. According to the invention, the blockchain basic service is operated in a system kernel mode; the method comprises the following steps: providing a security authentication service, a network basic service, a key management service, an equipment certificate generation service and a security authentication service, realizing complete protection of equipment and communication security assurance between the equipment based on the services, and providing services such as DDOS attack detection and defense schemes, point-to-point key distribution and blockchain application generation and deployment.

Description

technical field [0001] The present invention relates to blockchain technology, P2P technology, Internet of Things identity authentication technology, operating system (protocol stack) and information security (encryption and decryption technology), specifically the decentralized Internet of Things security authentication system, device registration method and identity authentication method , belonging to the field of Internet and network technology. Background technique [0002] The Internet of Things not only connects the physical world with the digital world, but also is the basis for the connection between people and things, and between things and things, enabling communication and information exchange between things and things, and between people and things. Connecting with people becomes more efficient and natural. Every change in the connection method will completely subvert the market. Ten billion-level companies like AT&T are representatives of the call network era,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L9/32
Inventor 李洪赭闫连山孙广成张晓薇李赛飞
Owner 安捷光通科技成都有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products