Unlock instant, AI-driven research and patent intelligence for your innovation.

Device access authentication system and method based on blockchain

A device access and authentication system technology, applied in the transmission system, digital transmission system, digital data authentication, etc., can solve problems such as difficult to popularize, maintain a large number of certificates, and fail to solve the problems of users, terminals, and platform trusted links

Active Publication Date: 2021-07-30
INFORMATION & COMM BRANCH OF STATE GRID JIANGSU ELECTRIC POWER +2
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the continuous development of IoT technology, traditional IoT device authentication faces many problems. For example, the existing security authentication and rights management mechanism does not solve the problem of establishing trusted links between users, terminals, and platforms. Traditional PKI-based The certification system requires maintenance of a large number of certificates and online exchange in scenarios where a large number of terminals are connected to the Internet of Things and point-to-point interactions are frequent and random. The overall construction and maintenance costs are high and it is difficult to popularize

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device access authentication system and method based on blockchain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] An embodiment of the present invention provides a block chain-based device access authentication system, including: an identification distribution module, a secret key generation center, a block chain, an edge server, and several terminal devices;

[0035] The identification distribution module assigns an identification code and a physical fingerprint ciphertext corresponding to the terminal equipment to each terminal equipment, and simultaneously sends the identification code and the physical fingerprint ciphertext to the block chain, and the identification code in each terminal equipment There is a mapping relationship with the physical fingerprint ciphertext; in the actual application process, the identification allocation module is a device belonging to the equipment manufacturer, which is used to assign the identification code and identification code corresponding to the terminal equipment to each terminal equipment. Physical fingerprint ciphertext, while sending th...

Embodiment 2

[0043] An embodiment of the present invention provides a block chain-based device access authentication method, including the following steps:

[0044] Utilize the identification distribution module to assign respectively the identification code and the physical fingerprint ciphertext corresponding to the terminal equipment to each terminal equipment, and send the identification code and the physical fingerprint ciphertext to the block chain at the same time, and the identification code and the physical fingerprint ciphertext in each terminal equipment and There is a mapping relationship between physical fingerprint ciphertexts;

[0045] Using the secret key generation center to generate an edge server public key and an edge server private key for the edge server, and send them to the edge server;

[0046] Use the secret key generation center to generate public keys and private keys for several terminal devices, and send them to the corresponding terminal devices;

[0047] Us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a block chain-based device access authentication system and method. The system includes an identification distribution module, a secret key generation center, a block chain, an edge server and a terminal device; the identification distribution module distributes identification codes and physical fingerprint keys The text is sent to the terminal device and the blockchain; the terminal device receives the edge server public key fed back by the edge server, uses its own public key, private key and edge server public key to encrypt its physical fingerprint to obtain the first authentication ciphertext, and sends it to the edge server. Server; the edge server uses the private key of the edge server and the public key of the terminal device to decrypt the first authentication ciphertext to obtain the second authentication ciphertext; the edge server uses the identification code of the terminal device to search for the corresponding physical fingerprint ciphertext on the block chain , and judge whether the terminal device can be accessed based on the search result. The invention realizes lightweight Internet of Things device authentication by using identification passwords and block chains, and can be applied to application scenarios where a large number of Internet of Things access devices exist.

Description

technical field [0001] The invention belongs to the technical field of Internet of Things device authentication, and in particular relates to a block chain-based device access authentication system and method. Background technique [0002] With the continuous development of IoT technology, traditional IoT device authentication faces many problems. For example, the existing security authentication and authority management mechanism does not solve the problem of establishing trusted links between users, terminals, and platforms. Traditional PKI-based The certification system, in the scenario of massive IoT terminal access and frequent and random point-to-point interactions, requires maintenance of a large number of certificates and online exchange, and the overall construction and maintenance costs are high, making it difficult to popularize. Contents of the invention [0003] In view of the above problems, the present invention proposes a block chain-based device access aut...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06H04L29/08G06F21/46
CPCG06F21/46H04L9/0825H04L9/0861H04L9/0866H04L9/0894H04L63/0442H04L63/0876H04L67/10H04L67/12
Inventor 张明明赵俊峰夏飞冒佳明夏元轶赵然许良杰杨允志陈牧陈璐
Owner INFORMATION & COMM BRANCH OF STATE GRID JIANGSU ELECTRIC POWER