Cross-domain access authentication method and system based on block chain

An authentication method and blockchain technology, applied in transmission systems, digital transmission systems, secure communication devices, etc.

Active Publication Date: 2021-04-09
STATE GRID HEBEI ELECTRIC POWER CO LTD +2
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the embodiment of the present invention is to provide a blockchain-based cross-d

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-domain access authentication method and system based on block chain
  • Cross-domain access authentication method and system based on block chain
  • Cross-domain access authentication method and system based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0061] In order to solve the problem of cloud server management pressure, an embodiment of the present invention provides a blockchain-based authentication method and system for cross-domain access.

[0062] It should be noted that a block chain-based cross-domain access authentication method provided by the present invention is applied to an authentication system, and the authentication system includes: an alliance chain composed of multiple cloud servers, mul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a cross-domain access authentication method and system based on a block chain, and is applied to the technical field of computers. The method comprises the following steps: when a target device performs cross-domain access for a target trust domain, signing and encrypting a device identifier of the target device by using an intra-domain private key and a cross-domain private key of the target device to obtain first information, and sending the first information to a first gateway; encrypting, by the first gateway, the information included in the first information by using the intra-domain public key and the cross-domain public key of the second gateway to obtain second information of the target device, and sending an access request carrying the second information to the second gateway in the target trust domain; and decrypting, by the second gateway, the second information by using the cross-domain private key and the intra-domain private key of the second gateway to obtain a device identifier of the target device, verifying the device identifier of the target device, and determining a key when the target device performs cross-domain access on the target trusted domain after the verification is passed. The invention solves the problem of management pressure of the cloud server.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a block chain-based authentication method and system for cross-domain access. Background technique [0002] The trust domain composed of devices and cloud servers is an important part of the Internet of Things, and there are differences in authentication methods between different trust domains. Due to the limited resources in the same trust domain, there are more and more cross-domain access requirements for devices in the Internet of Things. [0003] In the prior art, when the target device is registered in domain A, the cloud server in domain A generates the first key for the target device, and publishes the device ID and the first key of the target device to the consortium chain; when the target device in domain A When a device accesses domain B, the cloud server in domain A sends an access request carrying the device ID of the target device to the cloud server in d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L9/08
CPCH04L63/0442H04L63/083H04L63/10H04L63/0876H04L67/12H04L9/0825H04L63/12
Inventor 高丽芳徐思雅杨会峰郭少勇连阳阳魏欣马超廖博娴刘庆川肖帆李启蒙方蓬勃
Owner STATE GRID HEBEI ELECTRIC POWER CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products