Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Equipment authentication method based on block chain

A device authentication and blockchain technology, applied in the blockchain field, can solve problems such as threats and security vulnerabilities

Active Publication Date: 2020-10-30
BEIJING INST OF ARCHITECTURAL DESIGN +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, the Internet is an open system, and its openness leads to many security loopholes, threats and privacy issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment authentication method based on block chain
  • Equipment authentication method based on block chain
  • Equipment authentication method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0035] The embodiment of the present invention discloses a block chain-based device authentication method, including the following steps:

[0036] S1. Multiple certification centers build a consensus network through the blockchain;

[0037] S2. Establish a device model certification chain based on the consensus network;

[0038] S3. Establish a device certification chain based on the consensus network and device model certification;

[0039] S4. The certific...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an equipment authentication method based on a block chain. The method comprises the following steps: S1, enabling a plurality of authentication centers to construct a consensusnetwork through the block chain; S2, establishing an equipment model authentication chain based on a consensus network; S3, establishing an equipment authentication chain based on a consensus networkand equipment model authentication; and S4,enabling the authentication center to confirm an equipment authentication result based on the equipment model authentication chain and the equipment authentication chain. A consensus network is formed between city authentication centers through a block chain technology; each authentication center performs uplink management on an authentication result ofa certain equipment model and an equipment authentication result to form a block chain; according to the scheme, a new network entity does not need to be established for sharing the result between theauthentication centers, mutual credit granting between the authentication centers is not needed, and the output result of the authentication centers can be jointly maintained and accepted.

Description

technical field [0001] The present invention relates to the technical field of block chain, and more specifically relates to a device authentication method based on block chain. Background technique [0002] At present, the Internet is an open system, and its openness leads to many security loopholes, threats and privacy issues. All kinds of resources in the network are easy to be illegally accessed by attackers and cause economic losses and other problems. Therefore, it is very important for information service providers to verify the legality of network resource visitors. [0003] However, with the improvement and promotion of smart city-related technologies, there are more and more types of equipment related to urban perception, and the number of equipment is increasing. Different cities have different requirements for device characteristics due to different regions and other conditions. Therefore, the establishment of city-level device certification centers is increasin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32
CPCH04L63/0823H04L63/083H04L63/0876H04L67/1097H04L9/3247H04L9/3263H04L9/50
Inventor 刘济瑀丁峰张超
Owner BEIJING INST OF ARCHITECTURAL DESIGN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products