Unlock instant, AI-driven research and patent intelligence for your innovation.

Blockchain-based authentication method and system

A blockchain and block technology, applied in the field of security, can solve problems such as difficult to establish a trusted network, unable to solve problems, difficult to solve problems, etc.

Active Publication Date: 2019-09-20
NOKIA TECHNOLOGLES OY
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it is difficult to build a trusted network as there is no way to detect if all devices are cooperating / working as expected
To solve this problem, in the past few years, remote attestation techniques have tried to solve the problem of remotely identifying untrusted devices through hardware or software methods (such as WO2014141074 or US8966249), these techniques are based on strong assumptions, and as such, they cannot solve problems, but make them more difficult to solve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain-based authentication method and system
  • Blockchain-based authentication method and system
  • Blockchain-based authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] figure 1 is a representation of a network 10 with connected devices 11 implementing blockchain technology. The network 10 may be a Wifi, 3G, LTE, Bluetooth, RFID / NFC, wired connection network or any type of network that supports a protocol for exchanging messages between connected devices over the connection 13 . The messages exchanged can belong to one or more blockchain applications at different levels, e.g. HTTP / FTP based applications (to track network traffic), SSH / Telnet / RDP / VNC / VPN based applications (to track remote access) , RFID / NFC-based applications (tracking physical interactions), Wi-Fi applications, Bluetooth applications, etc. Every application or protocol to be monitored is associated with at least one blockchain. Different blockchains can be associated with the same application or protocol.

[0049] Each connected device 11 maintains a ledger (i.e. blockchain) of all it has access to and is shared between connected devices.

[0050] Each connected d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and system of authenticating a device within a network of connected devices that share a ledger of transactions between them under the form of exchanged blockchain messages and comprising: computing a PoK chain (70) based on the enhanced blockchain, receiving an authentication request from an application or a device, the authentication request including one or more PoKs (71), retrieving from the PoK database the PoK chain (70) corresponding to the application or device identified in the authentication request; computing a PoK (71) based on the PoK chain (70) retrieved from the PoK database, comparing it with the PoK (71) included in the authentication request, and if they match, validating the authentication request.

Description

technical field [0001] The invention relates to the technical field of security within a network of connected devices implementing blockchain technology. Background technique [0002] The actual model for device identification and authentication in the Internet is based on an atomic protocol, where a prover and a verifier exchange information and attempt to verify them. However, the same information exchanged during the recognition protocol can be modified / misused and should not be trusted. This is mainly due to two aspects. First, it is currently difficult to physically and permanently tie a device to its identity, and second, the identity itself should not be trusted because it can be easily hacked. [0003] In order to solve the above problems, an authentication protocol is usually adopted. They can be divided into centralized and decentralized. On the one hand, centralized protocols are based on trusted third parties, such as certification authorities, who are respon...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L2209/30H04L2209/80H04L9/3218H04L9/50H04L9/0643H04L63/061H04L63/0876H04L63/0884
Inventor M·西格诺里尼R·迪皮特罗W·卡努恩
Owner NOKIA TECHNOLOGLES OY