Unlock instant, AI-driven research and patent intelligence for your innovation.

Equipment authentication method based on block side chain structure in fog network

A device authentication and side chain technology, applied in structured data retrieval, public key for secure communication, user identity/authority verification, etc., can solve the problems of wasting device authentication time, consuming computing resources, and spending large storage resources. , to achieve the effect of large consumption of storage resources

Pending Publication Date: 2021-12-03
CHONGQING UNIV OF POSTS & TELECOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, there are a large number of encryption and verification steps in the authentication process, which consumes a lot of computing resources.
At the same time, nodes store the entire blockchain. When the scale of the Internet of Things is large, nodes will spend a lot of storage resources
In addition, after the device crosses the domain, if the device wants to access the Internet of Things again, it needs to register again, which wastes the time for device authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment authentication method based on block side chain structure in fog network
  • Equipment authentication method based on block side chain structure in fog network
  • Equipment authentication method based on block side chain structure in fog network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The embodiments of the present invention will be described below with reference to the specific examples of the present invention, and those skilled in the art can easily understand other advantages and efficacy of the present invention. The present invention can also be implemented or applied by other embodiments, and various details in this specification may also be based on different viewpoints and applications without departing from the spirit of the invention. It should be noted that the illustrations provided in the following examples will be described only by way of illustration, and in the case of unlamating, the following embodiments and embodiments may be combined with each other.

[0037] The drawings are for exemplary description, which is intended to be schematic diagrams, rather than experiencing, is not understood to limit the invention; in order to better illustrate an embodiment of the invention, there will be omitted, To zoom in, it does not represent the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an equipment authentication method based on a block side chain structure in a fog network, and belongs to the field of mobile communication. The method comprises the following steps: firstly, registering authentication information to a local authorization service center ASC, storing an equipment digital certificate hash value in a local side chain, and storing a fog node set number in a public main chain so as to realize the sharing of the authentication information; secondly, enabling the equipment to send an authentication request to the nearest fog node FN, so that the FN inquires the serial number of the fog node set where the equipment is located when the equipment is registered in a main chain, and an authentication mode is selected according to the serial number; if the fog node belongs to the current fog node set, entering a local authentication stage; otherwise, entering an information sharing authentication stage. Therefore, cross-domain authentication of the equipment is realized through authentication information sharing. In the scheme, through communication between trusted FNs, the encryption and signature times are reduced, and the consumption of computing resources is reduced; and meanwhile, through domain division and authentication information sharing, the authentication time and the storage overhead are reduced.

Description

Technical field [0001] The present invention is in the field of mobile communication, the authentication device relates to a method of block-based fog network side chain structure. Background technique [0002] With the rapid development of networking technology, things have been integrated into all areas of life. At the same time, the device connected to the Internet of things grow exponentially. Massive amounts of data generated as a large number of devices to cloud data center timely and effective treatment brings greater burden. Therefore, the calculation model is transferred to a new model to calculate the center of the edge, to reduce the computational burden through the center of the cloud computing has the ability to edge devices. Since the multi-terminal device and the number of edge devices, the level of complexity, and thus the system security requirements are also higher. The access authentication device as a first barrier things, must be done efficiently and safely. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/03H04W12/06G06F16/27G06F21/64H04L9/30H04L9/32H04L29/08
CPCH04W12/03H04W12/068H04L67/10H04L9/3066H04L9/3252H04L9/3263H04L9/3236G06F16/27G06F21/64H04L9/50
Inventor 黄晓舸何勇任洋陈前斌
Owner CHONGQING UNIV OF POSTS & TELECOMM