CN110049141A - Internet of Things distributed authentication method and its framework based on block chain - Google Patents

Internet of Things distributed authentication method and its framework based on block chain Download PDF

Info

Publication number
CN110049141A
CN110049141A CN201910437973.4A CN201910437973A CN110049141A CN 110049141 A CN110049141 A CN 110049141A CN 201910437973 A CN201910437973 A CN 201910437973A CN 110049141 A CN110049141 A CN 110049141A
Authority
CN
China
Prior art keywords
user
internet
block chain
things
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910437973.4A
Other languages
Chinese (zh)
Inventor
沈宇峰
丁乐
吕泉润
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Institute of Technology
Original Assignee
Nanjing Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Institute of Technology filed Critical Nanjing Institute of Technology
Priority to CN201910437973.4A priority Critical patent/CN110049141A/en
Publication of CN110049141A publication Critical patent/CN110049141A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Internet of Things distributed authentication method and its framework based on block chain are related to the technical field of Internet of Things authentication, more particularly to the technical field of the Internet of Things authentication based on block chain.The present invention includes the following steps: 1) to start and access access block chain link point;2) user information is obtained from intelligent contract using private key;3) user equipment sends access request to internet of things equipment is sent;4) user submits the signature of access authentication to trade using private key to intelligent contract;5) after Authority Verification passes through, user is successfully accessed the internet of things equipment, and carries out control operation.The framework of internet-of-things terminal distributed authentication method based on block chain, comprising: node structure, user policy, certificate interaction.The present invention can effectively solve the problem that the safety problem of central server information leakage;Safety and privacy when improving user's accessing internet of things equipment are effectively prevented illegal user and invade internet of things equipment;The efficiency of system is also improved simultaneously.

Description

Internet of Things distributed authentication method and its framework based on block chain
Technical field
The present invention relates to the technical fields of Internet of Things authentication, more particularly to the Internet of Things authentication based on block chain Technical field.
Background technique
Distributed account book refers to that the database for being distributed in multiple nodes or calculating in equipment, each node can replicate And save a ledger, and each node can be carried out it is independently updated.
Distributed authentication is based on distributed account book technology, when user, which invents, accesses a certain equipment, by most Node carries out ballot and reaches common understanding to determine whether with access authority, can be effectively prevented attacker personation legitimate user and obtain Take access authority, and the integrality of protection data.
As shown in Figure 1, in traditional central server authentication procedures, it is assumed that user A invention access equipment B, it is main Want process as follows: 1.1 user A send ID authentication request to central server S, and central server receives request;If 1.2 centers Server S thinks that user A is illegal, then refuses user's A access equipment B;If central server S thinks that user A is legal, return Authentication information is to A;Return authentication information gives equipment B while 1.3 central server S return authentication information are to A, to connect use Family A and equipment B.
But in traditional central server authentication procedures, at least there are following problems: in traditional center service In device authentication procedures, if central server is attacked, it is likely to result in the leakage of user and facility information, is caused serious Security risk.
Summary of the invention
Internet of Things based on block chain of the invention distinguishes authentication method, can effectively solve the problem that central server information leakage Safety problem;Safety and privacy when improving user's accessing internet of things equipment are effectively prevented illegal user's invasion Internet of things equipment;The efficiency of system is also improved simultaneously.
A kind of Internet of Things distributed authentication method based on block chain, comprising: user accesses block chain link point, user's selection Neighbouring internet of things equipment sends the authenticating transactions for accessing the internet of things equipment to block chain node;Based on distributed authentication Intelligent contract, executes permission verification function on block chain node, and intelligent contract returns to permission after executing and verifies whether to pass through, tests Obstructed user later is demonstrate,proved to user's invention access authority with sovereign right, user with sovereign right has refusal to access user, authorizes and release access The permission of internet of things equipment;If being verified, when user possesses the access authority of the equipment, the information being successfully accessed is returned to;Recognize After demonstrate,proving successfully, user can enter the operation interface of internet of things equipment, leave equipment after being operated.
The present invention provides a kind of node structure for the Internet of Things distributed authentication method based on block chain, comprising: system The block chain function services on basis, internet-of-things terminal block chain link connected to it are provided by operation block chain server node Point is communicated, and the event of intelligent contract triggering, is tested by 6 the subsequent of block on the block chain node by monitoring its connection Judge whether after card with access authority.
The present invention provides a kind of user policy for the Internet of Things distributed authentication method based on block chain, comprising: will be whole The identity of user is divided into two kinds in a system: user with sovereign right and access user;User with sovereign right possesses to keep accounts on block chain Right, pass through intelligent contract transaction change contract on certificate data;User with sovereign right has the equipment possessed absolute Control authority, access user only have access authority.
The present invention provides a kind of certificate exchange method for the Internet of Things distributed authentication method based on block chain, comprising: User with sovereign right modifies intelligent contract and creates the certificate of authority, and access user sends access authentication transaction to intelligent contract, when intelligent conjunction When the certificate in equipment about being examined to give access user's authorization, accesses user and internet of things equipment is connected with each other.
Internet of Things distributed authentication method based on block chain of the invention, passes through a certain number of chains of intelligent contracting organization Upper legitimate node initiates distributed authentication, and reaching common understanding after verifying judges whether with access authority, advantageously account in it is genuinely convinced The safety problem for device information leakage of being engaged in.The characteristic that can not be distorted using block chain, when improving user's accessing internet of things equipment Safety and privacy are effectively prevented illegal user and invade internet of things equipment.Numerous recognize in addition, block chain node is placed on It demonstrate,proves on server rather than on internet of things equipment, while also improving the efficiency of system.
Detailed description of the invention
The corresponding attached drawing of following embodiment can be used as exemplary illustration, but these exemplary illustrations are not constituted to embodiment Restriction;Wherein, the element for having same numbers label in attached drawing is similar element, has special statement, the figure in attached drawing Ru non- Composition does not limit.
Fig. 1 is the authentication procedures of current conventional center server.
Fig. 2 is the authentication procedures schematic diagram of the Internet of Things distributed authentication method the present invention is based on block chain.
Fig. 3 is the embodiment of the present invention one, the operational flowchart of the Internet of Things distributed authentication method based on block chain.
Fig. 4 is the embodiment of the present invention two, the flow chart of the Internet of Things distributed authentication method based on block chain.
Fig. 5 is the embodiment of the present invention three, the basic framework schematic diagram of the Internet of Things distributed authentication method based on block chain.
Specific embodiment
Exemplary embodiments of the present invention are described in detail below with reference to accompanying drawings.Although illustrating the present invention in attached drawing Exemplary embodiment, however may be realized in various forms the present invention, and should not be limited by embodiments set forth here System.On the contrary, the purpose that following embodiments are provided be for better understanding of the present invention, and can be by the scope of the present invention more Communicate completely to those skill in the art related.
Embodiment one
It as shown in Figure 2 and Figure 3, is the authentication procedures signal of Internet of Things distributed authentication method the present invention is based on block chain Figure and operational flowchart.It specifically includes:
Step S110: access block chain link point.
Step S120: obtaining intelligent contract address and ABI, ABI are application binaries interface.
Step S130: user data is obtained from intelligent contract using private key.
Wherein, password of the private key as operating system of user is automatically generated by block scm cluster;And public key is as user's Account is to be calculated by private key by various cryptographic algorithms, and public, private key occurs in pairs, can guarantee that user can in this way Unique operating right obtained to personal account.Meanwhile public key can not release private key, as long as so private key is not revealed, user's Information is difficult to be broken into and attack, and ensure that the safety of user information.
Step S140: whether the private key has registration information in contract.
In step S140, if private key has registration information in contract, S142 is thened follow the steps: obtaining from intelligent contract Internet of Things facility information, and execute step S150;Otherwise, it executes step S141: re-registering a user.
Step S150: selection internet of things equipment sends access request.
In step S150, the internet of things equipment that may be used about, user are shown using by existing local area network technology Click oneself want using equipment, then custom system to block scm cluster send request authentication information.
S160: Xiang Zhineng contract of step submits access authentication transaction.
Step S170: after 6 blocks, whether which is verified by the access authority of intelligent contract.
In step S170, if thening follow the steps S172 by the access authority verifying of intelligent contract: being successfully accessed object Networked devices, and execute step S180;Otherwise, it executes step S171: authorization invention is submitted to user with sovereign right by intelligent contract.
Wherein, intelligent contract shows as the set of one section of code and data on block chain, can be by distributed computer System or computer network are realized.It is primarily referred to as some promises defined in digital form, including contract participant can be with The agreement of these promises is executed above.Wherein, a set of promise refers to (often mutual) power that contract participant is agreed to Benefit and obligation, and define the essence and purpose of contract;And digital form meaning contract must not be not written into computer-readable generation In code.Correspondingly, block chain query combines intelligent contract, and the common recognition mechanism based on certification is voted, to judge that user is It is no to possess access authority.
Step S180: equipment lock operation user.
Step S190: equipment is operated by the control space of a whole page.
Step S200: operation terminates.
Step S210: equipment lock is released, is disconnected.
In step S180~S240, if user has passed through the common recognition certification of block scm cluster, user is allowed for access object The operation interface of networked devices, and executable operation intra vires is carried out, equipment can be free to exit after operation.By This completes a kind of operating process of Internet of Things distributed authentication system based on block chain.
In conclusion the embodiment of the present invention one provides a kind of Internet of Things distributed authentication system operation based on block chain Flow and method.Based in block chain Encryption Algorithm and intelligent contract, ensured the information in verification process be not easy to distort and Safety.In addition, authenticating by block scm cluster, the efficiency of system authentication can effectively improve.
Embodiment two
As shown in figure 4, being the present invention in the flow chart of the Internet of Things distributed authentication method of block chain.This method comprises:
Step S310: access request is sent.General subscriber terminal sends the certification request of internet of things equipment to block scm cluster.
In the present embodiment, block scm cluster is that numerous block chain server nodes is constituted, and provides basic block chain Function services.And general subscriber terminal is before connecting internet of things equipment, sends certification request to block scm cluster first, and by Block scm cluster is authenticated.Wherein, internet of things equipment cannot run block chain link point due to its hardware limitation, and switch to service Device operation, improves the efficiency of block chain certification to a certain extent.Moreover, internet-of-things terminal is required to and the overwhelming majority Block chain link point carries out communication authentication, while also ensuring the safety of data.
Step S320: the verifying transaction of access authentication is sent.Whether block scm cluster inquires the user by intelligent contract There are access authority, and are reached an agreement by common recognition mechanism.
Wherein, intelligent contract shows as the set of one section of code and data on block chain, can be by distributed computer System or computer network are realized;Common recognition mechanism shows as block chain node and is voted by certain mathematical algorithm invention, if The votes of certain operation are more than half, then execute the operation.
Step S330: permission verification information is returned.If the user does not have access authority, access is authorized to user with sovereign right invention The permission of equipment.
In step S330, the identity of user in whole system is divided into two kinds: user with sovereign right and access user;Sovereignty are used Family possesses the right kept accounts on block chain, changes contract data by the transaction of intelligent contract;User with sovereign right is to being gathered around Some equipment has absolute control authority, and access user only has access authority.So when the user does not have access authority, area Block scm cluster authorizes the permission of the customer access equipment to user with sovereign right invention.Meanwhile user with sovereign right to access user have refusal, Authorize and release the permission of access internet of things equipment.
Step S340: if user possesses access authority, it is successfully accessed internet of things equipment;Otherwise, user access is forbidden to set It is standby.
In step S340, user needs the certification of intelligent contract or user with sovereign right to authorize access authority, can just connect Enter the internet of things equipment of oneself selection.
In conclusion second embodiment of the present invention provides a kind of Internet of Things distributed authentication methods based on block chain.Base It is authenticated in the intelligent contract and distributed type assemblies of block chain, has ensured that the information in verification process is not easy to distort and safety.This Outside, by running block chain link point on numerous certificate servers, the efficiency of system authentication can effectively be improved.
Embodiment three
As shown in figure 5, being the basic framework schematic diagram of the Internet of Things distributed authentication system the present invention is based on block chain.Include: Node structure 410, user policy 420, certificate interaction 430.
Node structure 410: system provides the block chain function services on basis, Internet of Things by operation block chain server node Network termination block chain link point connected to it is communicated, intelligent contract triggering on the block chain node by monitoring its connection Event judges whether after the subsequent authentication of 6 blocks with access authority.
User policy 420: the identity of user in whole system is divided into two kinds: user with sovereign right and access user;Sovereignty are used Family possesses the right kept accounts on block chain, changes contract data by the transaction of intelligent contract;User with sovereign right is to being gathered around Some equipment has absolute control authority, and access user only has access authority.
Certificate interaction 430: user with sovereign right modifies intelligent contract and creates the certificate of authority, when access user sends out to block chain node When access authentication being sent to trade, the intelligent contract on block chain can check whether the certificate of internet of things equipment has been awarded to access device Power.
In conclusion the embodiment of the present invention three provides a kind of base of Internet of Things distributed authentication system based on block chain This framework.By the block chain node structure run on numerous certificate servers, the effect of system authentication can be effectively improved Rate;Internet-of-things terminal is communicated with the block chain link point that it is accessed, and is thrown by intelligent contract and common recognition mechanism Ticket, it is ensured that the safety of data and privacy;Meanwhile passing through certificate interaction and corresponding digital signature technology, it is ensured that The safety of information in network transmission process.
It is to be noted that above-described embodiment is only to be illustrated to the embodiment of the present invention, not to the present invention Embodiment is limited, and those skilled in the art can design without departing from the scope of the appended claims Alternative embodiment out.In above-mentioned claim, word "comprising" is not excluded for including that there are members not listed in the claims Part or step, "a" or "an" located in front of the element do not exclude the presence of multiple such elements.Meanwhile it should not will be located at and include Any reference symbol between number is considered limitations on claims.

Claims (7)

1. the Internet of Things distributed authentication method based on block chain, it is characterised in that include the following steps:
1) start and access access block chain link point;
2) user information is obtained from intelligent contract using private key;
3) user equipment sends access request to internet of things equipment is sent;
4) user submits the signature of access authentication to trade using private key to intelligent contract;
5) after Authority Verification passes through, user is successfully accessed the internet of things equipment, and carries out control operation.
2. the Internet of Things distributed authentication method according to claim 1 based on block chain, it is characterised in that request Internet of Things The step of net equipment authenticates specifically includes:
11) user equipment sends access request to internet of things equipment, and user submits access authentication to intelligent contract using private key Signature transaction;
12) internet of things equipment receives the request, and to the last state of block chain querying node intelligence contract;
13) whether given the user to authorize in the certificate of authority of intelligent contract checking internet of things equipment, authorized, return is tested Card passes through, and unauthorized then returns to verifying and do not pass through;
14) internet of things equipment receives the information of intelligent contract being verified, and passes through after subsequent authentication, with user equipment Connection is established, user equipment is successfully accessed internet of things equipment.
3. based on the Internet of Things distributed authentication method of block chain according to right 1 or 2, it is characterised in that above-mentioned to authenticate The specifying information of intelligent contract includes: in journey
Determine the address and description of user, internet of things equipment and certificate on block chain;
User is divided into user with sovereign right and access user, user with sovereign right has refusal to access user, authorizes and release access Internet of Things The permission of net equipment;
When being accessed again after accessing user and being authorized to, the agreement of user with sovereign right is needed not move through, the certificate verification of block chain is passed through Access internet of things equipment.
4. a kind of framework of the internet-of-things terminal distributed authentication method based on block chain characterized by comprising
For providing the node structure of the block chain function services on basis;
The user policy that authority of a user is configured;
Identification is carried out by block chain certificate and judges the certificate interaction of access authority.
5. the framework of the internet-of-things terminal distributed authentication method according to claim 4 based on block chain, feature exist In above-mentioned node structure includes:
System is communicated by operation block chain server node, internet-of-things terminal with the block chain link point of the overwhelming majority, is led to It crosses and inquires node certificate information on each block chain and authenticated.
6. the framework of the internet-of-things terminal distributed authentication method according to claim 4 based on block chain, feature exist In above-mentioned user policy includes:
The identity of user is divided into two kinds in whole system: user with sovereign right and access user;
User with sovereign right possesses the right kept accounts on block chain, changes contract data by the transaction of intelligent contract;
User with sovereign right has absolute control authority to the equipment possessed, and access user only has access authority.
7. the framework of the internet-of-things terminal distributed authentication method according to claim 4 based on block chain, feature exist In above-mentioned certificate interaction includes:
User with sovereign right modifies intelligent contract and creates the certificate of authority, when access user calls certificate and internet-of-things terminal to respond certificate When, it accesses user and internet of things equipment is connected with each other.
CN201910437973.4A 2019-05-24 2019-05-24 Internet of Things distributed authentication method and its framework based on block chain Pending CN110049141A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910437973.4A CN110049141A (en) 2019-05-24 2019-05-24 Internet of Things distributed authentication method and its framework based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910437973.4A CN110049141A (en) 2019-05-24 2019-05-24 Internet of Things distributed authentication method and its framework based on block chain

Publications (1)

Publication Number Publication Date
CN110049141A true CN110049141A (en) 2019-07-23

Family

ID=67283470

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910437973.4A Pending CN110049141A (en) 2019-05-24 2019-05-24 Internet of Things distributed authentication method and its framework based on block chain

Country Status (1)

Country Link
CN (1) CN110049141A (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110492908A (en) * 2019-07-31 2019-11-22 南京智睿能源互联网研究院有限公司 A kind of electric power communication manager based on block chain technology
CN110601844A (en) * 2019-08-22 2019-12-20 上海瑾琛网络科技有限公司 System and method for guaranteeing safety and authentication of Internet of things equipment by using block chain technology
CN110795755A (en) * 2019-12-26 2020-02-14 深圳市建筑科学研究院股份有限公司 Building project scene type evidence storing and non-tampering method and system based on block chain
CN111209558A (en) * 2019-12-26 2020-05-29 曙光网络科技有限公司 Internet of things equipment identity authentication method and system based on block chain
CN111447066A (en) * 2020-02-19 2020-07-24 江苏荣泽信息科技股份有限公司 Thing networking platform based on block chain
CN111444530A (en) * 2020-04-30 2020-07-24 中国银行股份有限公司 System data access authority control method and device based on block chain and modules
CN111667366A (en) * 2020-05-14 2020-09-15 武汉理工大学 Scientific and technological service transaction system and transaction method based on alliance block chain
CN111797404A (en) * 2020-06-28 2020-10-20 电子科技大学 IIoT equipment security architecture based on block chain and intelligent contract
CN111818087A (en) * 2020-07-27 2020-10-23 深圳壹账通智能科技有限公司 Block chain node access method, device, equipment and readable storage medium
CN111865917A (en) * 2020-06-16 2020-10-30 郑州信大捷安信息技术股份有限公司 Block chain-based safe delivery method, system and medium for Internet of things equipment
CN111970302A (en) * 2020-08-27 2020-11-20 烟台大学 Construction equipment authority management method and system
CN112202812A (en) * 2020-10-27 2021-01-08 中国联合网络通信集团有限公司 Water conservancy Internet of things terminal access authentication method and system based on block chain
CN112311735A (en) * 2019-07-30 2021-02-02 华为技术有限公司 Credible authentication method, network equipment, system and storage medium
CN112307445A (en) * 2020-09-30 2021-02-02 深圳百纳维科技有限公司 Identity management method and device based on block chain
CN112507310A (en) * 2020-12-05 2021-03-16 广州技象科技有限公司 Building Internet of things management method, device, equipment and storage medium
CN112910996A (en) * 2021-01-30 2021-06-04 上海上实龙创智能科技股份有限公司 Internet of things equipment access control method, system, device and storage medium
CN113259376A (en) * 2021-06-10 2021-08-13 永旗(北京)科技有限公司 Control method of Internet of things equipment based on block chain
WO2022006736A1 (en) * 2020-07-07 2022-01-13 Nokia Shanghai Bell Co., Ltd. Methods and apparatuses for device provisioning

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018075403A1 (en) * 2016-10-17 2018-04-26 Chronicled, Inc. Open registry for provenance and tracking of goods in the supply chain
CN108737348A (en) * 2017-04-21 2018-11-02 中国科学院信息工程研究所 A kind of internet of things equipment access control method of the intelligent contract based on block chain
CN109495516A (en) * 2019-01-07 2019-03-19 国网江苏省电力有限公司无锡供电分公司 Electric power internet-of-things terminal cut-in method based on block chain
CN109714174A (en) * 2019-02-18 2019-05-03 中国科学院合肥物质科学研究院 A kind of internet of things equipment digital identity management system and its method based on block chain
CN109714173A (en) * 2019-01-25 2019-05-03 北京邮电大学 A kind of Internet of Things authentication method and device based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018075403A1 (en) * 2016-10-17 2018-04-26 Chronicled, Inc. Open registry for provenance and tracking of goods in the supply chain
CN108737348A (en) * 2017-04-21 2018-11-02 中国科学院信息工程研究所 A kind of internet of things equipment access control method of the intelligent contract based on block chain
CN109495516A (en) * 2019-01-07 2019-03-19 国网江苏省电力有限公司无锡供电分公司 Electric power internet-of-things terminal cut-in method based on block chain
CN109714173A (en) * 2019-01-25 2019-05-03 北京邮电大学 A kind of Internet of Things authentication method and device based on block chain
CN109714174A (en) * 2019-02-18 2019-05-03 中国科学院合肥物质科学研究院 A kind of internet of things equipment digital identity management system and its method based on block chain

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112311735A (en) * 2019-07-30 2021-02-02 华为技术有限公司 Credible authentication method, network equipment, system and storage medium
CN112311735B (en) * 2019-07-30 2021-11-19 华为技术有限公司 Credible authentication method, network equipment, system and storage medium
WO2021018088A1 (en) * 2019-07-30 2021-02-04 华为技术有限公司 Trusted authentication method, network device, system and storage medium
CN110492908A (en) * 2019-07-31 2019-11-22 南京智睿能源互联网研究院有限公司 A kind of electric power communication manager based on block chain technology
CN110492908B (en) * 2019-07-31 2022-02-11 南京智睿能源互联网研究院有限公司 Electric power communication management machine based on block chain technology
CN110601844A (en) * 2019-08-22 2019-12-20 上海瑾琛网络科技有限公司 System and method for guaranteeing safety and authentication of Internet of things equipment by using block chain technology
CN110601844B (en) * 2019-08-22 2022-08-26 浙江连湖科技有限责任公司 System and method for guaranteeing safety and authentication of Internet of things equipment by using block chain technology
CN110795755A (en) * 2019-12-26 2020-02-14 深圳市建筑科学研究院股份有限公司 Building project scene type evidence storing and non-tampering method and system based on block chain
CN111209558A (en) * 2019-12-26 2020-05-29 曙光网络科技有限公司 Internet of things equipment identity authentication method and system based on block chain
CN110795755B (en) * 2019-12-26 2020-09-25 深圳市建筑科学研究院股份有限公司 Building project scene type evidence storing and non-tampering method and system based on block chain
CN111209558B (en) * 2019-12-26 2022-05-13 曙光网络科技有限公司 Internet of things equipment identity authentication method and system based on block chain
CN111447066A (en) * 2020-02-19 2020-07-24 江苏荣泽信息科技股份有限公司 Thing networking platform based on block chain
CN111444530A (en) * 2020-04-30 2020-07-24 中国银行股份有限公司 System data access authority control method and device based on block chain and modules
CN111444530B (en) * 2020-04-30 2023-08-18 中国银行股份有限公司 System data access authority control method and device based on block chain and modules
CN111667366B (en) * 2020-05-14 2023-06-27 武汉理工大学 Technology service transaction system and transaction method based on alliance blockchain
CN111667366A (en) * 2020-05-14 2020-09-15 武汉理工大学 Scientific and technological service transaction system and transaction method based on alliance block chain
CN111865917A (en) * 2020-06-16 2020-10-30 郑州信大捷安信息技术股份有限公司 Block chain-based safe delivery method, system and medium for Internet of things equipment
CN111865917B (en) * 2020-06-16 2022-03-15 郑州信大捷安信息技术股份有限公司 Block chain-based safe delivery method, system and medium for Internet of things equipment
CN111797404B (en) * 2020-06-28 2023-03-21 电子科技大学 IIoT equipment safety device based on block chain and intelligent contract
CN111797404A (en) * 2020-06-28 2020-10-20 电子科技大学 IIoT equipment security architecture based on block chain and intelligent contract
WO2022006736A1 (en) * 2020-07-07 2022-01-13 Nokia Shanghai Bell Co., Ltd. Methods and apparatuses for device provisioning
CN111818087A (en) * 2020-07-27 2020-10-23 深圳壹账通智能科技有限公司 Block chain node access method, device, equipment and readable storage medium
CN111970302B (en) * 2020-08-27 2022-06-14 烟台大学 Construction equipment authority management method and system
CN111970302A (en) * 2020-08-27 2020-11-20 烟台大学 Construction equipment authority management method and system
CN112307445B (en) * 2020-09-30 2021-08-10 深圳百纳维科技有限公司 Identity management method and device based on block chain
CN112307445A (en) * 2020-09-30 2021-02-02 深圳百纳维科技有限公司 Identity management method and device based on block chain
CN112202812A (en) * 2020-10-27 2021-01-08 中国联合网络通信集团有限公司 Water conservancy Internet of things terminal access authentication method and system based on block chain
CN112507310A (en) * 2020-12-05 2021-03-16 广州技象科技有限公司 Building Internet of things management method, device, equipment and storage medium
CN112507310B (en) * 2020-12-05 2024-03-29 广州技象科技有限公司 Building internet of things management method, device, equipment and storage medium
CN112910996A (en) * 2021-01-30 2021-06-04 上海上实龙创智能科技股份有限公司 Internet of things equipment access control method, system, device and storage medium
CN113259376A (en) * 2021-06-10 2021-08-13 永旗(北京)科技有限公司 Control method of Internet of things equipment based on block chain

Similar Documents

Publication Publication Date Title
CN110049141A (en) Internet of Things distributed authentication method and its framework based on block chain
CN100496025C (en) Ternary equal identification based reliable network access control method
CN108684041B (en) System and method for login authentication
CN105187431B (en) Login method, server, client and the communication system of third-party application
CN100553212C (en) A kind of reliable network access control system of differentiating based on the ternary equity
US20130042298A1 (en) System and method for generating trust among data network users
CN107231346A (en) A kind of method of cloud platform identification
US10333930B2 (en) System and method for transparent multi-factor authentication and security posture checking
CN114598540B (en) Access control system, method, device and storage medium
CN108243182B (en) Block chain management authorization method, sub-management end, root management end and storage medium
CN108418691A (en) Dynamic network identity identifying method based on SGX
CN101262342A (en) Distributed authorization and validation method, device and system
CN103095659A (en) Account login method and system in internet
KR102078913B1 (en) AUTHENTICATION METHOD AND SYSTEM OF IoT(Internet of Things) DEVICE BASED ON PUBLIC KEY INFRASTRUCTURE
US8056123B2 (en) Method, apparatus and program storage device for providing service access control for a user interface
US20160149893A1 (en) Strong authentication method
CN109285256A (en) Computer room based on block chain authentication enter permission give method
CN109347626A (en) A kind of safety identification authentication method with antitracking characteristic
CN117216740A (en) Digital identity authentication method based on blockchain technology
US20230412400A1 (en) Method for suspending protection of an object achieved by a protection device
CN110572392A (en) Identity authentication method based on HyperLegger network
CN113766450A (en) Vehicle virtual key sharing method, mobile terminal, server and vehicle
CN115189958B (en) Method for realizing authentication roaming and authentication between multi-level architectures
KR101996317B1 (en) Block chain based user authentication system using authentication variable and method thereof
CN114036490A (en) Security authentication method for calling plug-in software interface, USBKey driving device and authentication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190723