Intelligent Internet of Things equipment authentication method and system based on blockchain

A technology for Internet of Things devices and Internet-connected devices, applied in the field of Internet of Things, can solve the problems of human password and certificate storage costs, low degree of automation of the authentication process, difficult certificate management, etc., to achieve strong security, time saving, and computational complexity. reduced effect

Active Publication Date: 2021-07-23
UNIV OF SCI & TECH BEIJING
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] 1. In the authentication, there are human password and certificate storage costs and the possibility of human error, and the efficiency is low, and the degree of automation of the authentication process is not high
[0010] 2. Traditional encryption methods have difficulties in certificate management and excessive resource consumption in data encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent Internet of Things equipment authentication method and system based on blockchain
  • Intelligent Internet of Things equipment authentication method and system based on blockchain
  • Intelligent Internet of Things equipment authentication method and system based on blockchain

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0069] This embodiment provides a block chain-based intelligent IoT device authentication method, which can be implemented by an electronic device, and the electronic device can be a terminal or a server. The model principle of the blockchain-based intelligent IoT device authentication method is as follows: figure 1 As shown, specifically, the execution flow of the blockchain-based smart IoT device authentication method includes the following steps:

[0070] The IoT device generates its own identity based on the preset physical unclonable function, and uses its own identity as the public key of the searchable encryption algorithm to generate the preset ciphertext through the searchable encryption algorithm;

[0071] The registration center is based on the smart contract of the blockchain and the distributed ledger database, combined with the identity and ciphertext of the IoT device, generates the private key of the searchable encryption algorithm corresponding to the IoT devi...

no. 2 example

[0103] This embodiment provides a smart IoT device authentication system based on blockchain, the smart IoT device authentication system includes IoT devices, a registration center, and an authentication center; wherein,

[0104] The IoT device is used to generate its own identity based on a preset physical unclonable function, and uses its own identity as a public key of a searchable encryption algorithm to generate a preset ciphertext through a searchable encryption algorithm, and Send its own identity and ciphertext to the registration center;

[0105] The registration center is used for blockchain-based smart contracts and distributed ledger databases, combined with the identity and ciphertext of IoT devices to generate private keys corresponding to searchable encryption algorithms for IoT devices, and assigning group keys to IoT devices. The name and the public-private key pair of the ring signature algorithm, and complete the registration of the IoT device;

[0106] The...

no. 3 example

[0109] This embodiment provides an electronic device, which includes a processor and a memory; at least one instruction is stored in the memory, and the instruction is loaded and executed by the processor, so as to implement the method of the first embodiment.

[0110] The electronic device may have relatively large differences due to different configurations or performances, and may include one or more processors (central processing units, CPU) and one or more memories, wherein at least one instruction is stored in the memory, so The above instruction is loaded by the processor and executes the above method.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intelligent Internet of Things device authentication method and system based on a blockchain, and the method comprises the steps that equipment generates an identity label of the equipment based on a physical unclonable function, takes the identity label of the equipment as a public key of a searchable encryption algorithm, and generates a ciphertext; a registration center generates a private key of a searchable encryption algorithm corresponding to the equipment based on the smart contract and the distributed account book database, and distributes a public and private key pair of a group name and a ring signature algorithm to the equipment to complete registration of the equipment; an authentication center performs searchable encryption based on the identity label of the equipment by using an intelligent contract to realize personal login authentication of the equipment; and group login authentication of the equipment is realized based on a ring signature algorithm. According to the method, effective combined authentication can be implemented on the intelligent Internet of Things equipment, the intelligent contract is automatically executed, the problem of excessive resource consumption is reduced, the novel cryptographic algorithm is higher in calculation efficiency, and the safety of the system can be better ensured.

Description

technical field [0001] The invention relates to the field of the Internet of Things, in particular to a blockchain-based intelligent Internet of Things device authentication method and system. Background technique [0002] Currently, there are three common schemes for IoT identity authentication: [0003] 1) An identity authentication scheme based on public key infrastructure (PKI, public key infrastructure). In this scheme, the certificate authority assigns a digital certificate to each device, and the digital certificate contains the public key of the device and the digital certificate of the certificate authority. sign. The device side uses its own private key to generate a message signature, and the public key is used by the receiver to verify the signature. This scheme will not reveal the true identity of the device during the verification process. [0004] 2) An identity-based signature (IBS, identity-based signature) scheme, which implements the distribution of devi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06G06Q20/38H04L9/08
CPCH04L9/3278H04L9/0866H04L9/3226H04L63/0876G06Q20/3829H04L2209/72H04L2209/56
Inventor 陈红松张艺潆
Owner UNIV OF SCI & TECH BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products