Unlock instant, AI-driven research and patent intelligence for your innovation.

Block chain efficient authentication method based on trusted group

An authentication method and block chain technology, applied in the field of efficient block chain authentication based on trusted groups, can solve the problem that the consensus mechanism and cryptographic algorithm consume large storage resources, computing resources and network resources, and cannot meet the real-time requirements of the system. Issues such as exceeding the capabilities of terminal equipment to achieve the effects of reducing frequent authentication, improving user experience, smooth access and secure access

Pending Publication Date: 2021-11-09
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Although the security features of the traditional blockchain can meet some of the requirements for the security certification of the Internet of Things application system, the operation of the consensus mechanism and the cryptographic algorithm still consumes a large amount of storage resources, computing resources and network resources, which exceeds the capabilities of the terminal equipment.
At the same time, the security mechanism of the blockchain will cause a large network delay, poor user experience, and cannot meet the real-time requirements of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain efficient authentication method based on trusted group
  • Block chain efficient authentication method based on trusted group
  • Block chain efficient authentication method based on trusted group

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are the Some, but not all, embodiments are invented. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0020] The invention is an efficient authentication mechanism of block chain based on trusted group. The trusted group-based blockchain efficient authentication mechanism operates on the basis of the establishment of a dynamic trusted device group. In order to realize fault tolerance and rapid generation of dynamic trusted device groups, the present invention proposes ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a block chain efficient authentication method based on a trusted group. The method comprises the following steps: 1) constructing a block chain system oriented to an Internet of Things application by using an alliance chain; 2) enabling nodes in the Internet of Things to register to the block chain system, wherein the nodes comprise user equipment U and a sensing terminal ST, and selecting a plurality of registered STs as aggregation nodes SN; 3) initiating an access request by the node U to the block chain system, enabling the ST to receive the request and forward the request to the SN, and sending a consensus message by the SN to the ST; 4) when the consensus calculation is completed, determining a trusted node TST according to a consensus result; and 5) forming a trusted device group by the obtained TSTs, selecting one TST from the group to authenticate the U, if the authentication is passed, broadcasting an authentication result to each node in the group, and when the U moves to the range of any TST in the group, enabling the TST to compare and verify the stored authentication result with the authentication result provided by the U, and if the verification is passed, providing a data access service for the U.

Description

technical field [0001] The invention relates to the technical field of block chains, in particular to an efficient authentication method for block chains based on trusted groups. Background technique [0002] The Internet of Things (IOT) connects a large number of smart devices in daily life, such as various sensor terminals and smart home appliances such as cameras, air conditioners, and lights. In recent years, the rise of 5G has promoted the development of the IOT field. Most of the information communicated and processed in the IoT field involves user privacy and device operation data. Identity authentication, as the first level of security protection for the IoT system, has become a research hotspot. [0003] In the field of Internet of Things, the bottleneck of identity authentication is mainly reflected in two aspects of performance and security: (1) Sensor devices with low computing power and low energy constitute the Internet of Things system, and these devices use ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/57
CPCG06F21/31G06F21/57
Inventor 张珠君范伟朱大立
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI