Unlock instant, AI-driven research and patent intelligence for your innovation.

Block chain-based device identity authentication method and device

A technology of device identity and authentication method, applied in the field of blockchain, can solve the problem of untrustworthy source of blockchain mutual trust link

Active Publication Date: 2021-10-29
烨链(上海)科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of this application is to provide a blockchain-based device identity authentication method and device to solve the problem of untrustworthy sources in the blockchain mutual trust link in related technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain-based device identity authentication method and device
  • Block chain-based device identity authentication method and device
  • Block chain-based device identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0043] It should be noted that the terms "first" and "second" in the description and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It should be understood that the data so used may be interchanged under appropriate circumstances for...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a block chain-based device identity authentication method and device. The method is applied to a device terminal, which includes a business processing module and a blockchain module for identity authentication of the device terminal, and the method includes: a blockchain account and a private key generated offline by the blockchain module Sign the device identification code offline to generate device feature signature data; send the device feature signature data to the block chain access proxy server through the network for account activation processing, so that the block chain access proxy server writes the device feature signature data into the specified In the blockchain, the blockchain account is used as the unique identity of the device terminal in the specified blockchain. This application can solve the problem of how to solve the untrustworthy source in the blockchain mutual trust link in related technologies.

Description

technical field [0001] The present application relates to the technical field of block chain, in particular, to a method and device for device identity authentication based on block chain. Background technique [0002] The data on the blockchain is generally collected from the terminal equipment, and then processed by the server before being written into the blockchain, so that the data that is consensus and trustworthy is the processed data. How to directly collect data from terminal devices and ensure that its transmission process is not tampered with, such uplink data has higher credibility, which can basically solve the problem of untrustworthy sources in the blockchain mutual trust link. [0003] As for how to solve the problem of untrustworthy source in the mutual trust link of blockchain in related technologies, no effective solution has been proposed yet. Contents of the invention [0004] The main purpose of this application is to provide a blockchain-based devic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32
CPCH04L63/0876H04L67/104H04L9/3247H04L67/56
Inventor 蒋晓军彭仁夔朱立
Owner 烨链(上海)科技有限公司