Blockchain-based distributed trusted network connection method

A network connection and blockchain technology, applied in the field of distributed trusted network connection based on blockchain, can solve the problems of high overhead cost, unreasonable, prolonged network communication transmission, etc., to ensure reliability and authenticity , the effect of resisting man-in-the-middle attacks and ensuring security and credibility

Active Publication Date: 2021-04-06
XIDIAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the premise of this scheme is unreasonable, that is, in this scheme, the miners are completely trusted and in charge of the private key information of all terminal devices. Therefore, when the miners are maliciously invaded, the entire scheme system will face paralysis. Malicious terminal devices in the network environment will not be able to identify and verify, and the scheme does not design a trusted connection method for terminal devices based on the TNC framework, so it cannot guarantee the safe and trusted connection of terminal devices in a distributed environment
[0005] In the existing technology, all secure network connections require authentication by a trusted third party. There are problems such as single point of failure, extended network communication transmission time, and high overhead costs. In the absence of trusted third-party management, the existing The scheme does not have a complete scheme that can ensure the security authentication between terminal devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain-based distributed trusted network connection method
  • Blockchain-based distributed trusted network connection method
  • Blockchain-based distributed trusted network connection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037]In network communication, with the development of centralized network structure to distributed network development environment and the application of Internet of Things technology, people are more dependent and frequent on the application of various terminal devices in life and work, but terminal devices are improving people's lives. Quality and work efficiency also have certain security risks. Once the terminal equipment in the network environment is maliciously attacked, people's privacy and property security will be greatly threatened. In order to solve this severe challenge, the world's Both researchers and developers are working together to find a safe and feasible solution.

[0038] The present invention carries out innovation and research on these problems, and proposes a distributed trusted network connection method based on blockchain. In order to ensure the security and credibility of terminal devices in a distributed network environment, two-way user authentic...

Embodiment 2

[0073] The blockchain-based distributed trusted network connection method is the same as in Embodiment 1, and the terminal devices described in step (2.1) perform two-way user authentication through the blockchain. In order to express this process more clearly and conveniently, the present invention Use TDA terminal device and TDB terminal device to represent any two terminal devices in the distributed network that are undergoing two-way user authentication, specifically including the following steps:

[0074] (2.11) In a distributed environment, the TDA terminal device sends request information to the TDB terminal device. The request information includes its own device identification ID number, random number Na, and the ciphertext value of the user password to which TDA belongs, wherein the ciphertext value is determined by TDA It is obtained by encrypting the plaintext value of the password of the user using the TDA public key Kpub_a.

[0075](2.12) When TDB receives the req...

Embodiment 3

[0079] The blockchain-based distributed trusted network connection method is the same as that of Embodiment 1-2, and the terminal devices described in step (2.2) perform two-way platform authentication through the blockchain. In order to express this process more clearly and conveniently, The present invention uses a TDA terminal device and a TDB terminal device to represent any two terminal devices in the distributed network that are undergoing two-way platform authentication, specifically including the following steps:

[0080] (2.21) The TDA terminal device calculates the private key Kpri_tsa of a specific transaction according to its own ECDSA signature data; the TDB terminal device calculates the private key Kpri_tsb of a specific transaction according to its own ECDSA signature data.

[0081] (2.22) TDA accesses the blockchain and obtains the ECDSA signature value in TDB's initial transaction; TDB accesses the blockchain and obtains the ECDSA signature value in TDA's init...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a blockchain-based distributed trusted network connection method. To solve the problem that the distributed network access control framework cannot be provided in the existing trusted network connection, the implementation plan is: in the initialization stage, the terminal device registers and sends the information; the trusted third party verifies the registration information; the terminal device generates the initial transaction and broadcasts; the initial The transaction is stored in the blockchain; in the trusted network connection stage, any two terminals pass the two-way user and platform authentication of the blockchain; after the authentication is passed, in the update transaction stage, the terminal device generates an update transaction and broadcasts it; the update transaction is stored in the blockchain . The present invention combines blockchain and TNC to form an overall framework, without the participation of a trusted third party, to ensure two-way security authentication between users and platforms between terminal devices. Effectively defend against man-in-the-middle attacks and prevent malicious nodes from accessing the network. The invention is safe and credible, and is used for safe and credible connections in distributed networks.

Description

technical field [0001] The invention belongs to the technical field of network security, relates to a trusted network connection in the trusted computing field, and specifically relates to a blockchain-based distributed trusted network connection method. Trusted security connections for end-device users and platforms in a distributed network. Background technique [0002] The emergence of TCG (Trusted Computing Group) organization and a series of technical specifications including TNC (Trusted Network Connect) specification in 2003 marks the further maturity of trusted computing field. Under the guidance of the TNC specification, Cisco NAC uses the network infrastructure to perform security policy checks on all devices attempting to access network computing resources, thereby limiting emerging security threats such as viruses, worms, and spyware from compromising network security; The agent's client application transmits system information to a network policy server that wo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08H04L29/08G06Q40/04
CPCG06Q40/04H04L9/083H04L9/3252H04L63/0869H04L63/10H04L67/104
Inventor 商磊张俊伟马建峰卢笛杨潇涵李兴华杨超姜奇
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products