CN110049141A - Internet of Things distributed authentication method and its framework based on block chain - Google Patents
Internet of Things distributed authentication method and its framework based on block chain Download PDFInfo
- Publication number
- CN110049141A CN110049141A CN201910437973.4A CN201910437973A CN110049141A CN 110049141 A CN110049141 A CN 110049141A CN 201910437973 A CN201910437973 A CN 201910437973A CN 110049141 A CN110049141 A CN 110049141A
- Authority
- CN
- China
- Prior art keywords
- user
- internet
- block chain
- things
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Internet of Things distributed authentication method and its framework based on block chain are related to the technical field of Internet of Things authentication, more particularly to the technical field of the Internet of Things authentication based on block chain.The present invention includes the following steps: 1) to start and access access block chain link point;2) user information is obtained from intelligent contract using private key;3) user equipment sends access request to internet of things equipment is sent;4) user submits the signature of access authentication to trade using private key to intelligent contract;5) after Authority Verification passes through, user is successfully accessed the internet of things equipment, and carries out control operation.The framework of internet-of-things terminal distributed authentication method based on block chain, comprising: node structure, user policy, certificate interaction.The present invention can effectively solve the problem that the safety problem of central server information leakage;Safety and privacy when improving user's accessing internet of things equipment are effectively prevented illegal user and invade internet of things equipment;The efficiency of system is also improved simultaneously.
Description
Technical field
The present invention relates to the technical fields of Internet of Things authentication, more particularly to the Internet of Things authentication based on block chain
Technical field.
Background technique
Distributed account book refers to that the database for being distributed in multiple nodes or calculating in equipment, each node can replicate
And save a ledger, and each node can be carried out it is independently updated.
Distributed authentication is based on distributed account book technology, when user, which invents, accesses a certain equipment, by most
Node carries out ballot and reaches common understanding to determine whether with access authority, can be effectively prevented attacker personation legitimate user and obtain
Take access authority, and the integrality of protection data.
As shown in Figure 1, in traditional central server authentication procedures, it is assumed that user A invention access equipment B, it is main
Want process as follows: 1.1 user A send ID authentication request to central server S, and central server receives request;If 1.2 centers
Server S thinks that user A is illegal, then refuses user's A access equipment B;If central server S thinks that user A is legal, return
Authentication information is to A;Return authentication information gives equipment B while 1.3 central server S return authentication information are to A, to connect use
Family A and equipment B.
But in traditional central server authentication procedures, at least there are following problems: in traditional center service
In device authentication procedures, if central server is attacked, it is likely to result in the leakage of user and facility information, is caused serious
Security risk.
Summary of the invention
Internet of Things based on block chain of the invention distinguishes authentication method, can effectively solve the problem that central server information leakage
Safety problem;Safety and privacy when improving user's accessing internet of things equipment are effectively prevented illegal user's invasion
Internet of things equipment;The efficiency of system is also improved simultaneously.
A kind of Internet of Things distributed authentication method based on block chain, comprising: user accesses block chain link point, user's selection
Neighbouring internet of things equipment sends the authenticating transactions for accessing the internet of things equipment to block chain node;Based on distributed authentication
Intelligent contract, executes permission verification function on block chain node, and intelligent contract returns to permission after executing and verifies whether to pass through, tests
Obstructed user later is demonstrate,proved to user's invention access authority with sovereign right, user with sovereign right has refusal to access user, authorizes and release access
The permission of internet of things equipment;If being verified, when user possesses the access authority of the equipment, the information being successfully accessed is returned to;Recognize
After demonstrate,proving successfully, user can enter the operation interface of internet of things equipment, leave equipment after being operated.
The present invention provides a kind of node structure for the Internet of Things distributed authentication method based on block chain, comprising: system
The block chain function services on basis, internet-of-things terminal block chain link connected to it are provided by operation block chain server node
Point is communicated, and the event of intelligent contract triggering, is tested by 6 the subsequent of block on the block chain node by monitoring its connection
Judge whether after card with access authority.
The present invention provides a kind of user policy for the Internet of Things distributed authentication method based on block chain, comprising: will be whole
The identity of user is divided into two kinds in a system: user with sovereign right and access user;User with sovereign right possesses to keep accounts on block chain
Right, pass through intelligent contract transaction change contract on certificate data;User with sovereign right has the equipment possessed absolute
Control authority, access user only have access authority.
The present invention provides a kind of certificate exchange method for the Internet of Things distributed authentication method based on block chain, comprising:
User with sovereign right modifies intelligent contract and creates the certificate of authority, and access user sends access authentication transaction to intelligent contract, when intelligent conjunction
When the certificate in equipment about being examined to give access user's authorization, accesses user and internet of things equipment is connected with each other.
Internet of Things distributed authentication method based on block chain of the invention, passes through a certain number of chains of intelligent contracting organization
Upper legitimate node initiates distributed authentication, and reaching common understanding after verifying judges whether with access authority, advantageously account in it is genuinely convinced
The safety problem for device information leakage of being engaged in.The characteristic that can not be distorted using block chain, when improving user's accessing internet of things equipment
Safety and privacy are effectively prevented illegal user and invade internet of things equipment.Numerous recognize in addition, block chain node is placed on
It demonstrate,proves on server rather than on internet of things equipment, while also improving the efficiency of system.
Detailed description of the invention
The corresponding attached drawing of following embodiment can be used as exemplary illustration, but these exemplary illustrations are not constituted to embodiment
Restriction;Wherein, the element for having same numbers label in attached drawing is similar element, has special statement, the figure in attached drawing Ru non-
Composition does not limit.
Fig. 1 is the authentication procedures of current conventional center server.
Fig. 2 is the authentication procedures schematic diagram of the Internet of Things distributed authentication method the present invention is based on block chain.
Fig. 3 is the embodiment of the present invention one, the operational flowchart of the Internet of Things distributed authentication method based on block chain.
Fig. 4 is the embodiment of the present invention two, the flow chart of the Internet of Things distributed authentication method based on block chain.
Fig. 5 is the embodiment of the present invention three, the basic framework schematic diagram of the Internet of Things distributed authentication method based on block chain.
Specific embodiment
Exemplary embodiments of the present invention are described in detail below with reference to accompanying drawings.Although illustrating the present invention in attached drawing
Exemplary embodiment, however may be realized in various forms the present invention, and should not be limited by embodiments set forth here
System.On the contrary, the purpose that following embodiments are provided be for better understanding of the present invention, and can be by the scope of the present invention more
Communicate completely to those skill in the art related.
Embodiment one
It as shown in Figure 2 and Figure 3, is the authentication procedures signal of Internet of Things distributed authentication method the present invention is based on block chain
Figure and operational flowchart.It specifically includes:
Step S110: access block chain link point.
Step S120: obtaining intelligent contract address and ABI, ABI are application binaries interface.
Step S130: user data is obtained from intelligent contract using private key.
Wherein, password of the private key as operating system of user is automatically generated by block scm cluster;And public key is as user's
Account is to be calculated by private key by various cryptographic algorithms, and public, private key occurs in pairs, can guarantee that user can in this way
Unique operating right obtained to personal account.Meanwhile public key can not release private key, as long as so private key is not revealed, user's
Information is difficult to be broken into and attack, and ensure that the safety of user information.
Step S140: whether the private key has registration information in contract.
In step S140, if private key has registration information in contract, S142 is thened follow the steps: obtaining from intelligent contract
Internet of Things facility information, and execute step S150;Otherwise, it executes step S141: re-registering a user.
Step S150: selection internet of things equipment sends access request.
In step S150, the internet of things equipment that may be used about, user are shown using by existing local area network technology
Click oneself want using equipment, then custom system to block scm cluster send request authentication information.
S160: Xiang Zhineng contract of step submits access authentication transaction.
Step S170: after 6 blocks, whether which is verified by the access authority of intelligent contract.
In step S170, if thening follow the steps S172 by the access authority verifying of intelligent contract: being successfully accessed object
Networked devices, and execute step S180;Otherwise, it executes step S171: authorization invention is submitted to user with sovereign right by intelligent contract.
Wherein, intelligent contract shows as the set of one section of code and data on block chain, can be by distributed computer
System or computer network are realized.It is primarily referred to as some promises defined in digital form, including contract participant can be with
The agreement of these promises is executed above.Wherein, a set of promise refers to (often mutual) power that contract participant is agreed to
Benefit and obligation, and define the essence and purpose of contract;And digital form meaning contract must not be not written into computer-readable generation
In code.Correspondingly, block chain query combines intelligent contract, and the common recognition mechanism based on certification is voted, to judge that user is
It is no to possess access authority.
Step S180: equipment lock operation user.
Step S190: equipment is operated by the control space of a whole page.
Step S200: operation terminates.
Step S210: equipment lock is released, is disconnected.
In step S180~S240, if user has passed through the common recognition certification of block scm cluster, user is allowed for access object
The operation interface of networked devices, and executable operation intra vires is carried out, equipment can be free to exit after operation.By
This completes a kind of operating process of Internet of Things distributed authentication system based on block chain.
In conclusion the embodiment of the present invention one provides a kind of Internet of Things distributed authentication system operation based on block chain
Flow and method.Based in block chain Encryption Algorithm and intelligent contract, ensured the information in verification process be not easy to distort and
Safety.In addition, authenticating by block scm cluster, the efficiency of system authentication can effectively improve.
Embodiment two
As shown in figure 4, being the present invention in the flow chart of the Internet of Things distributed authentication method of block chain.This method comprises:
Step S310: access request is sent.General subscriber terminal sends the certification request of internet of things equipment to block scm cluster.
In the present embodiment, block scm cluster is that numerous block chain server nodes is constituted, and provides basic block chain
Function services.And general subscriber terminal is before connecting internet of things equipment, sends certification request to block scm cluster first, and by
Block scm cluster is authenticated.Wherein, internet of things equipment cannot run block chain link point due to its hardware limitation, and switch to service
Device operation, improves the efficiency of block chain certification to a certain extent.Moreover, internet-of-things terminal is required to and the overwhelming majority
Block chain link point carries out communication authentication, while also ensuring the safety of data.
Step S320: the verifying transaction of access authentication is sent.Whether block scm cluster inquires the user by intelligent contract
There are access authority, and are reached an agreement by common recognition mechanism.
Wherein, intelligent contract shows as the set of one section of code and data on block chain, can be by distributed computer
System or computer network are realized;Common recognition mechanism shows as block chain node and is voted by certain mathematical algorithm invention, if
The votes of certain operation are more than half, then execute the operation.
Step S330: permission verification information is returned.If the user does not have access authority, access is authorized to user with sovereign right invention
The permission of equipment.
In step S330, the identity of user in whole system is divided into two kinds: user with sovereign right and access user;Sovereignty are used
Family possesses the right kept accounts on block chain, changes contract data by the transaction of intelligent contract;User with sovereign right is to being gathered around
Some equipment has absolute control authority, and access user only has access authority.So when the user does not have access authority, area
Block scm cluster authorizes the permission of the customer access equipment to user with sovereign right invention.Meanwhile user with sovereign right to access user have refusal,
Authorize and release the permission of access internet of things equipment.
Step S340: if user possesses access authority, it is successfully accessed internet of things equipment;Otherwise, user access is forbidden to set
It is standby.
In step S340, user needs the certification of intelligent contract or user with sovereign right to authorize access authority, can just connect
Enter the internet of things equipment of oneself selection.
In conclusion second embodiment of the present invention provides a kind of Internet of Things distributed authentication methods based on block chain.Base
It is authenticated in the intelligent contract and distributed type assemblies of block chain, has ensured that the information in verification process is not easy to distort and safety.This
Outside, by running block chain link point on numerous certificate servers, the efficiency of system authentication can effectively be improved.
Embodiment three
As shown in figure 5, being the basic framework schematic diagram of the Internet of Things distributed authentication system the present invention is based on block chain.Include:
Node structure 410, user policy 420, certificate interaction 430.
Node structure 410: system provides the block chain function services on basis, Internet of Things by operation block chain server node
Network termination block chain link point connected to it is communicated, intelligent contract triggering on the block chain node by monitoring its connection
Event judges whether after the subsequent authentication of 6 blocks with access authority.
User policy 420: the identity of user in whole system is divided into two kinds: user with sovereign right and access user;Sovereignty are used
Family possesses the right kept accounts on block chain, changes contract data by the transaction of intelligent contract;User with sovereign right is to being gathered around
Some equipment has absolute control authority, and access user only has access authority.
Certificate interaction 430: user with sovereign right modifies intelligent contract and creates the certificate of authority, when access user sends out to block chain node
When access authentication being sent to trade, the intelligent contract on block chain can check whether the certificate of internet of things equipment has been awarded to access device
Power.
In conclusion the embodiment of the present invention three provides a kind of base of Internet of Things distributed authentication system based on block chain
This framework.By the block chain node structure run on numerous certificate servers, the effect of system authentication can be effectively improved
Rate;Internet-of-things terminal is communicated with the block chain link point that it is accessed, and is thrown by intelligent contract and common recognition mechanism
Ticket, it is ensured that the safety of data and privacy;Meanwhile passing through certificate interaction and corresponding digital signature technology, it is ensured that
The safety of information in network transmission process.
It is to be noted that above-described embodiment is only to be illustrated to the embodiment of the present invention, not to the present invention
Embodiment is limited, and those skilled in the art can design without departing from the scope of the appended claims
Alternative embodiment out.In above-mentioned claim, word "comprising" is not excluded for including that there are members not listed in the claims
Part or step, "a" or "an" located in front of the element do not exclude the presence of multiple such elements.Meanwhile it should not will be located at and include
Any reference symbol between number is considered limitations on claims.
Claims (7)
1. the Internet of Things distributed authentication method based on block chain, it is characterised in that include the following steps:
1) start and access access block chain link point;
2) user information is obtained from intelligent contract using private key;
3) user equipment sends access request to internet of things equipment is sent;
4) user submits the signature of access authentication to trade using private key to intelligent contract;
5) after Authority Verification passes through, user is successfully accessed the internet of things equipment, and carries out control operation.
2. the Internet of Things distributed authentication method according to claim 1 based on block chain, it is characterised in that request Internet of Things
The step of net equipment authenticates specifically includes:
11) user equipment sends access request to internet of things equipment, and user submits access authentication to intelligent contract using private key
Signature transaction;
12) internet of things equipment receives the request, and to the last state of block chain querying node intelligence contract;
13) whether given the user to authorize in the certificate of authority of intelligent contract checking internet of things equipment, authorized, return is tested
Card passes through, and unauthorized then returns to verifying and do not pass through;
14) internet of things equipment receives the information of intelligent contract being verified, and passes through after subsequent authentication, with user equipment
Connection is established, user equipment is successfully accessed internet of things equipment.
3. based on the Internet of Things distributed authentication method of block chain according to right 1 or 2, it is characterised in that above-mentioned to authenticate
The specifying information of intelligent contract includes: in journey
Determine the address and description of user, internet of things equipment and certificate on block chain;
User is divided into user with sovereign right and access user, user with sovereign right has refusal to access user, authorizes and release access Internet of Things
The permission of net equipment;
When being accessed again after accessing user and being authorized to, the agreement of user with sovereign right is needed not move through, the certificate verification of block chain is passed through
Access internet of things equipment.
4. a kind of framework of the internet-of-things terminal distributed authentication method based on block chain characterized by comprising
For providing the node structure of the block chain function services on basis;
The user policy that authority of a user is configured;
Identification is carried out by block chain certificate and judges the certificate interaction of access authority.
5. the framework of the internet-of-things terminal distributed authentication method according to claim 4 based on block chain, feature exist
In above-mentioned node structure includes:
System is communicated by operation block chain server node, internet-of-things terminal with the block chain link point of the overwhelming majority, is led to
It crosses and inquires node certificate information on each block chain and authenticated.
6. the framework of the internet-of-things terminal distributed authentication method according to claim 4 based on block chain, feature exist
In above-mentioned user policy includes:
The identity of user is divided into two kinds in whole system: user with sovereign right and access user;
User with sovereign right possesses the right kept accounts on block chain, changes contract data by the transaction of intelligent contract;
User with sovereign right has absolute control authority to the equipment possessed, and access user only has access authority.
7. the framework of the internet-of-things terminal distributed authentication method according to claim 4 based on block chain, feature exist
In above-mentioned certificate interaction includes:
User with sovereign right modifies intelligent contract and creates the certificate of authority, when access user calls certificate and internet-of-things terminal to respond certificate
When, it accesses user and internet of things equipment is connected with each other.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910437973.4A CN110049141A (en) | 2019-05-24 | 2019-05-24 | Internet of Things distributed authentication method and its framework based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910437973.4A CN110049141A (en) | 2019-05-24 | 2019-05-24 | Internet of Things distributed authentication method and its framework based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110049141A true CN110049141A (en) | 2019-07-23 |
Family
ID=67283470
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910437973.4A Pending CN110049141A (en) | 2019-05-24 | 2019-05-24 | Internet of Things distributed authentication method and its framework based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110049141A (en) |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110492908A (en) * | 2019-07-31 | 2019-11-22 | 南京智睿能源互联网研究院有限公司 | A kind of electric power communication manager based on block chain technology |
CN110601844A (en) * | 2019-08-22 | 2019-12-20 | 上海瑾琛网络科技有限公司 | System and method for guaranteeing safety and authentication of Internet of things equipment by using block chain technology |
CN110795755A (en) * | 2019-12-26 | 2020-02-14 | 深圳市建筑科学研究院股份有限公司 | Building project scene type evidence storing and non-tampering method and system based on block chain |
CN111209558A (en) * | 2019-12-26 | 2020-05-29 | 曙光网络科技有限公司 | Internet of things equipment identity authentication method and system based on block chain |
CN111447066A (en) * | 2020-02-19 | 2020-07-24 | 江苏荣泽信息科技股份有限公司 | Thing networking platform based on block chain |
CN111444530A (en) * | 2020-04-30 | 2020-07-24 | 中国银行股份有限公司 | System data access authority control method and device based on block chain and modules |
CN111667366A (en) * | 2020-05-14 | 2020-09-15 | 武汉理工大学 | Scientific and technological service transaction system and transaction method based on alliance block chain |
CN111797404A (en) * | 2020-06-28 | 2020-10-20 | 电子科技大学 | IIoT equipment security architecture based on block chain and intelligent contract |
CN111818087A (en) * | 2020-07-27 | 2020-10-23 | 深圳壹账通智能科技有限公司 | Block chain node access method, device, equipment and readable storage medium |
CN111865917A (en) * | 2020-06-16 | 2020-10-30 | 郑州信大捷安信息技术股份有限公司 | Block chain-based safe delivery method, system and medium for Internet of things equipment |
CN111970302A (en) * | 2020-08-27 | 2020-11-20 | 烟台大学 | Construction equipment authority management method and system |
CN112202812A (en) * | 2020-10-27 | 2021-01-08 | 中国联合网络通信集团有限公司 | Water conservancy Internet of things terminal access authentication method and system based on block chain |
CN112311735A (en) * | 2019-07-30 | 2021-02-02 | 华为技术有限公司 | Credible authentication method, network equipment, system and storage medium |
CN112307445A (en) * | 2020-09-30 | 2021-02-02 | 深圳百纳维科技有限公司 | Identity management method and device based on block chain |
CN112507310A (en) * | 2020-12-05 | 2021-03-16 | 广州技象科技有限公司 | Building Internet of things management method, device, equipment and storage medium |
CN112910996A (en) * | 2021-01-30 | 2021-06-04 | 上海上实龙创智能科技股份有限公司 | Internet of things equipment access control method, system, device and storage medium |
CN113259376A (en) * | 2021-06-10 | 2021-08-13 | 永旗(北京)科技有限公司 | Control method of Internet of things equipment based on block chain |
WO2022006736A1 (en) * | 2020-07-07 | 2022-01-13 | Nokia Shanghai Bell Co., Ltd. | Methods and apparatuses for device provisioning |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018075403A1 (en) * | 2016-10-17 | 2018-04-26 | Chronicled, Inc. | Open registry for provenance and tracking of goods in the supply chain |
CN108737348A (en) * | 2017-04-21 | 2018-11-02 | 中国科学院信息工程研究所 | A kind of internet of things equipment access control method of the intelligent contract based on block chain |
CN109495516A (en) * | 2019-01-07 | 2019-03-19 | 国网江苏省电力有限公司无锡供电分公司 | Electric power internet-of-things terminal cut-in method based on block chain |
CN109714174A (en) * | 2019-02-18 | 2019-05-03 | 中国科学院合肥物质科学研究院 | A kind of internet of things equipment digital identity management system and its method based on block chain |
CN109714173A (en) * | 2019-01-25 | 2019-05-03 | 北京邮电大学 | A kind of Internet of Things authentication method and device based on block chain |
-
2019
- 2019-05-24 CN CN201910437973.4A patent/CN110049141A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018075403A1 (en) * | 2016-10-17 | 2018-04-26 | Chronicled, Inc. | Open registry for provenance and tracking of goods in the supply chain |
CN108737348A (en) * | 2017-04-21 | 2018-11-02 | 中国科学院信息工程研究所 | A kind of internet of things equipment access control method of the intelligent contract based on block chain |
CN109495516A (en) * | 2019-01-07 | 2019-03-19 | 国网江苏省电力有限公司无锡供电分公司 | Electric power internet-of-things terminal cut-in method based on block chain |
CN109714173A (en) * | 2019-01-25 | 2019-05-03 | 北京邮电大学 | A kind of Internet of Things authentication method and device based on block chain |
CN109714174A (en) * | 2019-02-18 | 2019-05-03 | 中国科学院合肥物质科学研究院 | A kind of internet of things equipment digital identity management system and its method based on block chain |
Cited By (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112311735A (en) * | 2019-07-30 | 2021-02-02 | 华为技术有限公司 | Credible authentication method, network equipment, system and storage medium |
CN112311735B (en) * | 2019-07-30 | 2021-11-19 | 华为技术有限公司 | Credible authentication method, network equipment, system and storage medium |
WO2021018088A1 (en) * | 2019-07-30 | 2021-02-04 | 华为技术有限公司 | Trusted authentication method, network device, system and storage medium |
CN110492908A (en) * | 2019-07-31 | 2019-11-22 | 南京智睿能源互联网研究院有限公司 | A kind of electric power communication manager based on block chain technology |
CN110492908B (en) * | 2019-07-31 | 2022-02-11 | 南京智睿能源互联网研究院有限公司 | Electric power communication management machine based on block chain technology |
CN110601844A (en) * | 2019-08-22 | 2019-12-20 | 上海瑾琛网络科技有限公司 | System and method for guaranteeing safety and authentication of Internet of things equipment by using block chain technology |
CN110601844B (en) * | 2019-08-22 | 2022-08-26 | 浙江连湖科技有限责任公司 | System and method for guaranteeing safety and authentication of Internet of things equipment by using block chain technology |
CN110795755A (en) * | 2019-12-26 | 2020-02-14 | 深圳市建筑科学研究院股份有限公司 | Building project scene type evidence storing and non-tampering method and system based on block chain |
CN111209558A (en) * | 2019-12-26 | 2020-05-29 | 曙光网络科技有限公司 | Internet of things equipment identity authentication method and system based on block chain |
CN110795755B (en) * | 2019-12-26 | 2020-09-25 | 深圳市建筑科学研究院股份有限公司 | Building project scene type evidence storing and non-tampering method and system based on block chain |
CN111209558B (en) * | 2019-12-26 | 2022-05-13 | 曙光网络科技有限公司 | Internet of things equipment identity authentication method and system based on block chain |
CN111447066A (en) * | 2020-02-19 | 2020-07-24 | 江苏荣泽信息科技股份有限公司 | Thing networking platform based on block chain |
CN111444530A (en) * | 2020-04-30 | 2020-07-24 | 中国银行股份有限公司 | System data access authority control method and device based on block chain and modules |
CN111444530B (en) * | 2020-04-30 | 2023-08-18 | 中国银行股份有限公司 | System data access authority control method and device based on block chain and modules |
CN111667366B (en) * | 2020-05-14 | 2023-06-27 | 武汉理工大学 | Technology service transaction system and transaction method based on alliance blockchain |
CN111667366A (en) * | 2020-05-14 | 2020-09-15 | 武汉理工大学 | Scientific and technological service transaction system and transaction method based on alliance block chain |
CN111865917A (en) * | 2020-06-16 | 2020-10-30 | 郑州信大捷安信息技术股份有限公司 | Block chain-based safe delivery method, system and medium for Internet of things equipment |
CN111865917B (en) * | 2020-06-16 | 2022-03-15 | 郑州信大捷安信息技术股份有限公司 | Block chain-based safe delivery method, system and medium for Internet of things equipment |
CN111797404B (en) * | 2020-06-28 | 2023-03-21 | 电子科技大学 | IIoT equipment safety device based on block chain and intelligent contract |
CN111797404A (en) * | 2020-06-28 | 2020-10-20 | 电子科技大学 | IIoT equipment security architecture based on block chain and intelligent contract |
WO2022006736A1 (en) * | 2020-07-07 | 2022-01-13 | Nokia Shanghai Bell Co., Ltd. | Methods and apparatuses for device provisioning |
CN111818087A (en) * | 2020-07-27 | 2020-10-23 | 深圳壹账通智能科技有限公司 | Block chain node access method, device, equipment and readable storage medium |
CN111970302B (en) * | 2020-08-27 | 2022-06-14 | 烟台大学 | Construction equipment authority management method and system |
CN111970302A (en) * | 2020-08-27 | 2020-11-20 | 烟台大学 | Construction equipment authority management method and system |
CN112307445B (en) * | 2020-09-30 | 2021-08-10 | 深圳百纳维科技有限公司 | Identity management method and device based on block chain |
CN112307445A (en) * | 2020-09-30 | 2021-02-02 | 深圳百纳维科技有限公司 | Identity management method and device based on block chain |
CN112202812A (en) * | 2020-10-27 | 2021-01-08 | 中国联合网络通信集团有限公司 | Water conservancy Internet of things terminal access authentication method and system based on block chain |
CN112507310A (en) * | 2020-12-05 | 2021-03-16 | 广州技象科技有限公司 | Building Internet of things management method, device, equipment and storage medium |
CN112507310B (en) * | 2020-12-05 | 2024-03-29 | 广州技象科技有限公司 | Building internet of things management method, device, equipment and storage medium |
CN112910996A (en) * | 2021-01-30 | 2021-06-04 | 上海上实龙创智能科技股份有限公司 | Internet of things equipment access control method, system, device and storage medium |
CN113259376A (en) * | 2021-06-10 | 2021-08-13 | 永旗(北京)科技有限公司 | Control method of Internet of things equipment based on block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110049141A (en) | Internet of Things distributed authentication method and its framework based on block chain | |
CN100496025C (en) | Ternary equal identification based reliable network access control method | |
CN108684041B (en) | System and method for login authentication | |
CN105187431B (en) | Login method, server, client and the communication system of third-party application | |
CN100553212C (en) | A kind of reliable network access control system of differentiating based on the ternary equity | |
US20130042298A1 (en) | System and method for generating trust among data network users | |
CN107231346A (en) | A kind of method of cloud platform identification | |
US10333930B2 (en) | System and method for transparent multi-factor authentication and security posture checking | |
CN114598540B (en) | Access control system, method, device and storage medium | |
CN108243182B (en) | Block chain management authorization method, sub-management end, root management end and storage medium | |
CN108418691A (en) | Dynamic network identity identifying method based on SGX | |
CN101262342A (en) | Distributed authorization and validation method, device and system | |
CN103095659A (en) | Account login method and system in internet | |
KR102078913B1 (en) | AUTHENTICATION METHOD AND SYSTEM OF IoT(Internet of Things) DEVICE BASED ON PUBLIC KEY INFRASTRUCTURE | |
US8056123B2 (en) | Method, apparatus and program storage device for providing service access control for a user interface | |
US20160149893A1 (en) | Strong authentication method | |
CN109285256A (en) | Computer room based on block chain authentication enter permission give method | |
CN109347626A (en) | A kind of safety identification authentication method with antitracking characteristic | |
CN117216740A (en) | Digital identity authentication method based on blockchain technology | |
US20230412400A1 (en) | Method for suspending protection of an object achieved by a protection device | |
CN110572392A (en) | Identity authentication method based on HyperLegger network | |
CN113766450A (en) | Vehicle virtual key sharing method, mobile terminal, server and vehicle | |
CN115189958B (en) | Method for realizing authentication roaming and authentication between multi-level architectures | |
KR101996317B1 (en) | Block chain based user authentication system using authentication variable and method thereof | |
CN114036490A (en) | Security authentication method for calling plug-in software interface, USBKey driving device and authentication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190723 |