Device access authentication system and method based on blockchain
A device access and authentication system technology, applied in the transmission system, digital transmission system, digital data authentication, etc., can solve problems such as difficult to popularize, maintain a large number of certificates, and fail to solve the problems of users, terminals, and platform trusted links
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0034] An embodiment of the present invention provides a block chain-based device access authentication system, including: an identification distribution module, a secret key generation center, a block chain, an edge server, and several terminal devices;
[0035] The identification distribution module assigns an identification code and a physical fingerprint ciphertext corresponding to the terminal equipment to each terminal equipment, and simultaneously sends the identification code and the physical fingerprint ciphertext to the block chain, and the identification code in each terminal equipment There is a mapping relationship with the physical fingerprint ciphertext; in the actual application process, the identification allocation module is a device belonging to the equipment manufacturer, which is used to assign the identification code and identification code corresponding to the terminal equipment to each terminal equipment. Physical fingerprint ciphertext, while sending th...
Embodiment 2
[0043] An embodiment of the present invention provides a block chain-based device access authentication method, including the following steps:
[0044] Utilize the identification distribution module to assign respectively the identification code and the physical fingerprint ciphertext corresponding to the terminal equipment to each terminal equipment, and send the identification code and the physical fingerprint ciphertext to the block chain at the same time, and the identification code and the physical fingerprint ciphertext in each terminal equipment and There is a mapping relationship between physical fingerprint ciphertexts;
[0045] Using the secret key generation center to generate an edge server public key and an edge server private key for the edge server, and send them to the edge server;
[0046] Use the secret key generation center to generate public keys and private keys for several terminal devices, and send them to the corresponding terminal devices;
[0047] Us...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
