Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-layer blockchain cross-domain authentication method in the application scenario of the Internet of Things

A technology of application scenarios and authentication methods, applied in the field of Internet of Things and blockchain, can solve the problems of increasing the cost of certificate management in centralized identity authentication methods, low certificate management efficiency, and difficulty in mutual trust between CAs, so as to reduce block bloat and improve The effect of space utilization and throughput improvement

Active Publication Date: 2022-06-24
CHONGQING UNIV +1
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional cloud center identity authentication methods such as symmetric key management and public key infrastructure (PKI) frameworks not only have high operating costs in the scenario of dynamic access to massive IoT devices, but also have problems in cross-domain authentication scenarios. like:
[0004] 1) It is difficult for CAs to trust each other. In the scenario of cross-domain authentication, it is difficult to find a globally trusted CA to provide identity authentication, and there is often a problem of mutual distrust among multiple CAs.
[0005] 2) The efficiency of certificate management is low. In the centralized management method, the concurrent problems of massive devices in the application scenarios of the Internet of Things, as well as the problems of dynamic access and heterogeneous networks have greatly increased the certificate management cost of the centralized identity authentication method.
[0006] 3) The single point of failure problem. The centralized identity authentication method relies on a trusted third party to provide identity authentication. Once the third party fails or is attacked, the service will be unavailable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-layer blockchain cross-domain authentication method in the application scenario of the Internet of Things
  • Multi-layer blockchain cross-domain authentication method in the application scenario of the Internet of Things
  • Multi-layer blockchain cross-domain authentication method in the application scenario of the Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] The embodiments of the present invention are described below through specific specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the contents disclosed in this specification. The present invention can also be implemented or applied through other different specific embodiments, and various details in this specification can also be modified or changed based on different viewpoints and applications without departing from the spirit of the present invention. It should be noted that the drawings provided in the following embodiments are only used to illustrate the basic idea of ​​the present invention in a schematic manner, and the following embodiments and features in the embodiments can be combined with each other without conflict.

[0076] see Figure 1 to Figure 4 , according to an embodiment of the present invention, a cross-domain authentication scheme of multi-layer blockchain in the applica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a multi-layer blockchain cross-domain authentication method under the application scenario of the Internet of Things, belonging to the technical fields of the Internet of Things and the blockchain. This method uses the blockchain identity registration protocol, cross-domain identity authentication protocol, and node trust evaluation method based on entrusted proof of rights and interests to perform distributed node management and security protection on the blockchain in IoT application scenarios. When different blocks When the nodes of the chain need to perform cross-chain identity authentication and data exchange, the public blockchain is used for cross-chain credible identity authentication to ensure user privacy and data security. Programs include etc. Compared with the original centralized identity authentication method, the present invention improves the efficiency of identity authentication in the distributed application scenario of the Internet of Things, solves the problem of certificate management in heterogeneous networks, and has better security and usability.

Description

technical field [0001] The invention belongs to the technical fields of the Internet of Things and blockchain, and relates to a cross-domain identity authentication scheme in network security technology, in particular to the management of intra-domain nodes under multiple Internet of Things management domains and the cross-domain identity authentication of heterogeneous networks of the Internet of Things. Trustworthiness across multiple administrative domains. Background technique [0002] In the IoT application scenario, IoT devices will collect various data generated in people's daily production and life, and IoT devices in different management domains need to exchange data frequently to complete collaborative tasks and improve efficiency. All of these exacerbate the risk of data and privacy breaches. [0003] The traditional IoT platform uses a cloud-centric approach to perform identity authentication and manage various data streams generated by IoT terminals. Compared w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/12H04L67/10
CPCH04L63/08H04L63/0823H04L63/083H04L67/12H04L67/10
Inventor 张亚兵叶春晓邢镔
Owner CHONGQING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products