Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-layer blockchain cross-domain authentication method in Internet of Things application scene

A technology of application scenarios and authentication methods, which is applied in the fields of the Internet of Things and blockchain, and can solve problems such as mutual distrust, low efficiency of certificate management, and high operating costs

Active Publication Date: 2021-04-09
CHONGQING UNIV +1
View PDF10 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional cloud center identity authentication methods such as symmetric key management and public key infrastructure (PKI) frameworks not only have high operating costs in the scenario of dynamic access to massive IoT devices, but also have problems in cross-domain authentication scenarios. like:
[0004] 1) It is difficult for CAs to trust each other. In the scenario of cross-domain authentication, it is difficult to find a globally trusted CA to provide identity authentication, and there is often a problem of mutual distrust among multiple CAs.
[0005] 2) The efficiency of certificate management is low. In the centralized management method, the concurrent problems of massive devices in the application scenarios of the Internet of Things, as well as the problems of dynamic access and heterogeneous networks have greatly increased the certificate management cost of the centralized identity authentication method.
[0006] 3) The single point of failure problem. The centralized identity authentication method relies on a trusted third party to provide identity authentication. Once the third party fails or is attacked, the service will be unavailable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-layer blockchain cross-domain authentication method in Internet of Things application scene
  • Multi-layer blockchain cross-domain authentication method in Internet of Things application scene
  • Multi-layer blockchain cross-domain authentication method in Internet of Things application scene

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] Embodiments of the present invention are described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific implementation modes, and various modifications or changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention. It should be noted that the diagrams provided in the following embodiments are only schematically illustrating the basic concept of the present invention, and the following embodiments and the features in the embodiments can be combined with each other in the case of no conflict.

[0076] see Figure 1 ~ Figure 4 , according to an embodiment of the present invention, a cross-domain authentication scheme of a multi-layer blockchain in an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a multi-layer blockchain cross-domain authentication method in an Internet of Things application scene, and belongs to the technical field of Internet of Things and blockchains. According to the method, a blockchain identity registration protocol, a cross-domain identity authentication protocol and a node trust degree evaluation method based on delegation proving of rights and interests are used for carrying out distributed node management and security protection on the blockchain in an application scene of the Internet of Things; and when nodes of different blockchains need to carry out cross-chain identity authentication and data exchange, the across-chain trusted identity authentication is carried out by using a public block chain, so that the user privacy and the data security are ensured. The technical scheme includes the contents in the specification. Compared with an original centralized identity authentication mode, the identity authentication efficiency under the distributed application scene of the Internet of Things is improved, the management problem of certificates under a heterogeneous network is solved, and good safety and usability are achieved.

Description

technical field [0001] The invention belongs to the technical field of the Internet of Things and block chain, relates to a cross-domain identity authentication scheme in network security technology, and specifically relates to intra-domain node management under multiple Internet of Things management domains and cross-domain identity authentication of Internet of Things heterogeneous networks, evaluation Trustworthiness among multiple administrative domains. Background technique [0002] In the application scenario of the Internet of Things, the Internet of Things devices will collect various data generated in people's daily production and life, and the Internet of Things devices under different management domains need to exchange data frequently to complete collaborative tasks and improve efficiency. These have exacerbated the risk of data and privacy breaches. [0003] The traditional IoT platform adopts the cloud center method to perform identity authentication and manag...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L63/0823H04L63/083H04L67/12H04L67/10
Inventor 张亚兵叶春晓邢镔
Owner CHONGQING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products