CN114095505A - Multi-USB device block chain authentication method - Google Patents
Multi-USB device block chain authentication method Download PDFInfo
- Publication number
- CN114095505A CN114095505A CN202111422640.8A CN202111422640A CN114095505A CN 114095505 A CN114095505 A CN 114095505A CN 202111422640 A CN202111422640 A CN 202111422640A CN 114095505 A CN114095505 A CN 114095505A
- Authority
- CN
- China
- Prior art keywords
- usb
- authentication
- usb device
- devices
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a multi-USB device block chain authentication method, which comprises the following steps: registering a plurality of USB devices with a blockchain service; after the registration is finished, the user binds the USB equipment by using the fingerprint; when authentication is needed, fingerprint identification is firstly carried out after a plurality of USB devices are accessed, the USB devices are accessed after successful identification, each USB is authenticated on the block chain service through the information of the USB devices, and the whole authentication is completed when all the USB devices are successfully authenticated; the invention can effectively solve the identity authentication problem in a high-security scene, and the user can master the identity authentication voucher by himself and combine with the block chain technology, so that the identity authentication can be realized by multiple persons and multiple devices.
Description
Technical Field
The invention relates to the technical field of computers and hardware, in particular to a multi-USB device block chain authentication method.
Background
At present, the conventional identity authentication is that a password or a fingerprint directly verifies the identity, but once the password or fingerprint information is leaked, serious results can be caused. Once the password or fingerprint information is revealed, the user can hold the password or fingerprint information for identity authentication without any protection measures. This must be prevented where the security requirements for some services are high.
Disclosure of Invention
In order to solve the problems in the prior art, the invention aims to provide a multi-USB device block chain authentication method, which can effectively solve the problem of identity authentication in a high-security scene, and a user can master an identity authentication certificate and combine the identity authentication certificate with a block chain technology to realize the identity security authentication by multiple people and multiple devices.
In order to achieve the purpose, the invention adopts the technical scheme that: a multi-USB device block chain authentication method comprises the following steps:
s10, registering a plurality of USB devices by the blockchain service;
s20, after the registration is completed, the user uses the fingerprint to bind the USB device;
and S30, when authentication is needed, fingerprint identification is firstly carried out after the USB equipment is accessed, the USB equipment is accessed after the identification is successful, each USB is authenticated on the block chain service through the information of the USB equipment, and when all the USB equipment is authenticated successfully, the whole authentication is completed.
As a preferred embodiment, the step S10 specifically includes the following steps:
s11, registering information of the USB device to the blockchain service, wherein the registered information comprises a unique USB device identifier, a USB device chip model, a firmware version and a public and private key pair of the USB device;
s12, HASH the device information using the USB device private key, and then register the HASH value and the USB device public key with the blockchain service.
As another preferred embodiment, the step S30 specifically includes the following steps:
s31, when authentication is needed, starting an authentication system, and waiting for all USB devices to access;
s32, after all USB devices are accessed into the authentication system, firstly, fingerprint identification is carried out, and after the fingerprint identification is successful, the USB devices are accessed;
s33, the authentication system identifies all accessed USB devices and carries out primary detection on the USB devices;
s34, after the preliminary detection is finished, the authentication system respectively authenticates on the block chain service through the information registered by each USB device, and transmits the HASH value of the USB device information and the signature of the USB device information by the USB device private key to the block chain service for authenticating each USB device;
and S35, when all USB devices are successfully authenticated, finishing the whole authentication.
The invention has the beneficial effects that:
1. the USB equipment is registered on the chain, the equipment is stored in the hand of the user, and fingerprint authentication is carried out, so that no relation exists even if the password or fingerprint information is leaked. Authentication entails a USB device, fingerprint or password plus blockchain joint authentication. The single authentication pass also needs a plurality of devices to be authenticated by a plurality of persons at the same time to complete the final authentication, so that the authentication safety can be ensured even if the single device and the password information are leaked.
2. The invention can carry out stronger protection on the identity for the scene with higher security level, and the combination with the block chain technology in the authentication process ensures that the USB equipment cannot be forged and the authentication security is ensured; the multiple devices control the authority together, so that the control is more reliable and safer.
Drawings
Fig. 1 is a flow chart of an authentication method according to an embodiment of the present invention.
Detailed Description
Embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
Examples
As shown in fig. 1, a method for authenticating a multi-USB device blockchain includes:
step 1, USB equipment registers USB equipment information to a block chain service, wherein the registration information comprises an equipment unique identifier, an equipment chip model, a firmware version and an equipment public and private key pair;
step 2, the equipment uses the equipment private key to carry out HASH on the equipment information, and then the HASH value and the equipment public key are registered in the block chain;
step 3, after the registration is finished, the user uses the fingerprint to bind the USB equipment (after the binding, the USB equipment can be unlocked only by the fingerprint of the bound person);
step 4, when authentication is needed, the authentication system is formally started, and then the USB hardware equipment is accessed;
step 5, the authentication of multiple devices can be set according to the system, that is, the whole authentication can be completed only when several devices are accessed simultaneously, and the number of the devices is considered to be n in the process;
step 6, after the USB equipment is accessed into the system, fingerprint identification is carried out, and the system can access the USB equipment only after the fingerprint identification is successful;
step 7, the system sets all the accessed devices and carries out preliminary inspection on the devices;
and 8, after the preliminary detection is finished, the system carries the information of each USB device to the block chain service for respective authentication. The system transmits the HASH value of the equipment information and the signature of the equipment private key on the equipment information to the block chain service for authenticating each equipment;
and 9, after the n devices are successfully authenticated, finishing the whole authentication.
The blockchain authentication to this multi-device has all been completed, including blockchain registration of the device, multi-device fingerprint access, and device-to-blockchain authentication. The service system can set different equipment numbers according to service requirements, when each equipment passes the authentication, the whole authentication process is passed, and if one equipment does not pass the authentication, the whole authentication process fails. The devices are registered on the blockchain service, and the USB devices are kept by the users, and are inserted into the devices when the USB devices need to be used, and the authentication can be performed only by fingerprint unlocking.
The above-mentioned embodiments only express the specific embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention.
Claims (3)
1. A multi-USB device block chain authentication method is characterized by comprising the following steps:
s10, registering a plurality of USB devices by the blockchain service;
s20, after the registration is completed, the user uses the fingerprint to bind the USB device;
and S30, when authentication is needed, fingerprint identification is firstly carried out after the USB equipment is accessed, the USB equipment is accessed after the identification is successful, each USB is authenticated on the block chain service through the information of the USB equipment, and when all the USB equipment is authenticated successfully, the whole authentication is completed.
2. The multi-USB device blockchain authentication method according to claim 1, wherein the step S10 specifically includes the steps of:
s11, registering information of the USB device to the blockchain service, wherein the registered information comprises a unique USB device identifier, a USB device chip model, a firmware version and a public and private key pair of the USB device;
s12, HASH the device information using the USB device private key, and then register the HASH value and the USB device public key with the blockchain service.
3. The multi-USB device blockchain authentication method according to claim 2, wherein the step S30 specifically includes the steps of:
s31, when authentication is needed, starting an authentication system, and waiting for all USB devices to access;
s32, after all USB devices are accessed into the authentication system, firstly, fingerprint identification is carried out, and after the fingerprint identification is successful, the USB devices are accessed;
s33, the authentication system identifies all accessed USB devices and carries out primary detection on the USB devices;
s34, after the preliminary detection is finished, the authentication system respectively authenticates on the block chain service through the information registered by each USB device, and transmits the HASH value of the USB device information and the signature of the USB device information by the USB device private key to the block chain service for authenticating each USB device;
and S35, when all USB devices are successfully authenticated, finishing the whole authentication.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111422640.8A CN114095505B (en) | 2021-11-26 | 2021-11-26 | Multi-USB device block chain authentication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111422640.8A CN114095505B (en) | 2021-11-26 | 2021-11-26 | Multi-USB device block chain authentication method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114095505A true CN114095505A (en) | 2022-02-25 |
CN114095505B CN114095505B (en) | 2023-04-11 |
Family
ID=80305053
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111422640.8A Active CN114095505B (en) | 2021-11-26 | 2021-11-26 | Multi-USB device block chain authentication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114095505B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108833114A (en) * | 2018-06-13 | 2018-11-16 | 上海交通大学 | A kind of decentralization identity authorization system and method based on block chain |
CN109327457A (en) * | 2018-11-09 | 2019-02-12 | 广州大学 | A kind of internet of things equipment identity identifying method and system based on block chain |
CN110958111A (en) * | 2019-12-09 | 2020-04-03 | 广东电网有限责任公司 | Electric power mobile terminal identity authentication mechanism based on block chain |
CN111222858A (en) * | 2019-12-31 | 2020-06-02 | 陕西医链区块链集团有限公司 | Method for realizing block chain fingerprint identification authentication of personal wallet |
US20200265418A1 (en) * | 2019-02-19 | 2020-08-20 | Samsung Electronics Co., Ltd. | Electronic device and method for providing digital signature service of block chain using the same |
CN111967278A (en) * | 2020-08-14 | 2020-11-20 | 广州驰创科技有限公司 | Block chain card reader |
CN113378148A (en) * | 2021-06-09 | 2021-09-10 | 永旗(北京)科技有限公司 | Internet of things equipment identity authentication system and method based on block chain |
-
2021
- 2021-11-26 CN CN202111422640.8A patent/CN114095505B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108833114A (en) * | 2018-06-13 | 2018-11-16 | 上海交通大学 | A kind of decentralization identity authorization system and method based on block chain |
CN109327457A (en) * | 2018-11-09 | 2019-02-12 | 广州大学 | A kind of internet of things equipment identity identifying method and system based on block chain |
US20200265418A1 (en) * | 2019-02-19 | 2020-08-20 | Samsung Electronics Co., Ltd. | Electronic device and method for providing digital signature service of block chain using the same |
CN110958111A (en) * | 2019-12-09 | 2020-04-03 | 广东电网有限责任公司 | Electric power mobile terminal identity authentication mechanism based on block chain |
CN111222858A (en) * | 2019-12-31 | 2020-06-02 | 陕西医链区块链集团有限公司 | Method for realizing block chain fingerprint identification authentication of personal wallet |
CN111967278A (en) * | 2020-08-14 | 2020-11-20 | 广州驰创科技有限公司 | Block chain card reader |
CN113378148A (en) * | 2021-06-09 | 2021-09-10 | 永旗(北京)科技有限公司 | Internet of things equipment identity authentication system and method based on block chain |
Non-Patent Citations (1)
Title |
---|
宋鹏程等: "基于区块链技术的可信任设备及其在物联网中的应用", 《中国科技信息》 * |
Also Published As
Publication number | Publication date |
---|---|
CN114095505B (en) | 2023-04-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107172008B (en) | A kind of system and method carrying out multisystem certification and synchronization in a mobile device | |
US8151344B1 (en) | Method and apparatus to authenticate a user | |
CN1855810B (en) | Dynamic code verification system, method and use | |
CN111931144B (en) | Unified safe login authentication method and device for operating system and service application | |
CN111414599A (en) | Identity authentication method, device, terminal, server and readable storage medium | |
US10931663B2 (en) | Terminal authenticated access | |
CN102664903A (en) | Network user identifying method and system | |
CN101557406A (en) | User terminal authentication method, device and system thereof | |
CN100365974C (en) | Device and method for controlling computer access | |
CN111800377B (en) | Mobile terminal identity authentication system based on safe multi-party calculation | |
CN107634834A (en) | A kind of trusted identity authentication method based on the more scenes in multiple terminals | |
CN101394276A (en) | Authentication system and method based on USB hardware token | |
WO2015062441A1 (en) | Cgi web interface multi-session verification code generation and verification method | |
CN101867588A (en) | Access control system based on 802.1x | |
CN101207483A (en) | Bidirectional double factor authentication method | |
KR101020754B1 (en) | Device and method for verifying personal identity non-repudiation using bio-information | |
CN110516427B (en) | Terminal user identity authentication method and device, storage medium and computer equipment | |
CN114095505B (en) | Multi-USB device block chain authentication method | |
WO2005086012A1 (en) | Electronic terminal device protection system | |
CN113536260A (en) | Method and device for improving identity authentication security level based on biological characteristics | |
CN111865998A (en) | Network security zone login method and device | |
CN110717177A (en) | Method for safely unlocking computer in real time by using mobile terminal | |
JP4303952B2 (en) | Multiple authentication system, computer program, and multiple authentication method | |
JP3230653U (en) | VPN connection control device linked to biometric authentication | |
CN109672526B (en) | Method and system for managing executable program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |