Unlock instant, AI-driven research and patent intelligence for your innovation.

Equipment identity authentication method and device based on block chain

A technology of device identity and authentication method, applied in the field of blockchain, can solve the problem of untrustworthy source of the mutual trust link of blockchain

Active Publication Date: 2019-10-25
烨链(上海)科技有限公司
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of this application is to provide a blockchain-based device identity authentication method and device to solve the problem of untrustworthy sources in the blockchain mutual trust link in related technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment identity authentication method and device based on block chain
  • Equipment identity authentication method and device based on block chain
  • Equipment identity authentication method and device based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0043] It should be noted that the terms "first" and "second" in the description and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It should be understood that the data so used may be interchanged under appropriate circumstances for...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an equipment identity authentication method and device based on a block chain. The method is applied to an equipment terminal. The equipment terminal comprises a service processing module and a block chain module used for carrying out identity authentication on the equipment terminal, and the method comprises the following steps: carrying out offline signature on an equipment identification code according to a block chain account and a private key which are generated offline by the block chain module, and generating equipment characteristic signature data; and sending the equipment characteristic signature data to a block chain access proxy server through networking to perform account activation processing, so that the block chain access proxy server writes the equipment characteristic signature data into a specified block chain, and the block chain account is used as a unique identity identifier of the equipment terminal in the specified block chain. Accordingto the application, the problem of how to solve the problem of untrusted source in the block chain mutual trust link in related technologies can be solved.

Description

technical field [0001] The present application relates to the technical field of block chain, in particular, to a method and device for device identity authentication based on block chain. Background technique [0002] The data on the blockchain is generally collected from the terminal equipment, and then processed by the server before being written into the blockchain, so that the data that is consensus and trustworthy is the processed data. How to directly collect data from terminal devices and ensure that its transmission process is not tampered with, such uplink data has higher credibility, which can basically solve the problem of untrustworthy sources in the blockchain mutual trust link. [0003] As for how to solve the problem of untrustworthy source in the mutual trust link of blockchain in related technologies, no effective solution has been proposed yet. Contents of the invention [0004] The main purpose of this application is to provide a blockchain-based devic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/32
CPCH04L63/0876H04L67/104H04L9/3247H04L67/56
Inventor 蒋晓军彭仁夔朱立
Owner 烨链(上海)科技有限公司