CN110944301A - Intelligent cell equipment monitoring system based on block chain and key management method - Google Patents
Intelligent cell equipment monitoring system based on block chain and key management method Download PDFInfo
- Publication number
- CN110944301A CN110944301A CN201911211234.XA CN201911211234A CN110944301A CN 110944301 A CN110944301 A CN 110944301A CN 201911211234 A CN201911211234 A CN 201911211234A CN 110944301 A CN110944301 A CN 110944301A
- Authority
- CN
- China
- Prior art keywords
- block chain
- information
- authentication
- key
- party
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/38—Services specially adapted for particular environments, situations or purposes for collecting sensor information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a smart cell equipment monitoring system based on a block chain and a key management method, wherein the smart cell equipment monitoring system comprises a sensor node device, a key management device and a key management device, wherein the sensor node device is used for acquiring equipment operation parameters of a smart cell; the block chain network is used for sending authentication request information to an authentication terminal to request to generate a verification mode of a key for authentication after receiving sensor information transmitted by the wireless sensor node; the authentication terminal is used for authenticating after receiving the verification request information sent by the block chain network, returning a private key to the block chain network after the authentication is passed, sending the private key to the property central control room device, and uploading data in a set time period to the cloud end for storage; and the property central control room device is used for receiving and displaying the sensor node information sent by the block chain. The invention reduces the system overhead, has the advantages of safety and resource saving, realizes intelligent cell management, has great market value, and solves the problem that the public and private keys are difficult to store in the block chain application.
Description
Technical Field
The present invention relates to the field of blockchain application technologies, and in particular, to a monitoring system and a key management method for smart cell devices based on blockchains.
Background
With the development of the internet of things technology, monitoring technologies applied to intelligent cells are more and more common, some high-end cells also have higher and higher requirements on the security of property, in the traditional cell central control room monitoring, cameras and some sensors are installed on the site to monitor field equipment, centralized processing is realized by adopting a method of uploading the data to a central control room in a centralized mode, the quantity of transmitted data is large and unsafe, for some hackers, malicious tampering can be performed on the field video data or the monitoring data of the sensors in a mode of intercepting a transmission channel, serious consequences can occur, real mastering and understanding of the equipment operation condition of the intelligent cells can not be performed, and with the mature development of a block chain technology, the advantages of distributivity, interconnectivity, encryption and the like are increasingly embodied.
In the prior art, a block chain carries out data encryption and decryption through various cryptographic mechanisms, an ownership verification mechanism is based on an asymmetric encryption algorithm, a public and private key pair asymmetrically encrypted in the block chain is a keystone for constructing a whole trust system, a public key expresses an address, and private key transactions are signed, but the public and private keys are difficult to store and the like.
Disclosure of Invention
The invention aims to overcome the defects of the prior art, provides a smart cell equipment monitoring system and a key management method based on a block chain, reduces the system overhead, has the advantages of safety and resource saving, realizes the smart cell management, has great market value, and solves the problem of difficult storage of the public and private keys applied to the block chain.
The purpose of the invention is realized by the following technical scheme:
a smart cell equipment monitoring system based on a block chain comprises a sensor node device, a sensor node device and a monitoring module, wherein the sensor node device is used for acquiring equipment operation parameters of a smart cell; the block chain network is used for sending authentication request information to an authentication terminal to request to generate a verification mode of a key for authentication after receiving sensor information transmitted by the wireless sensor node; the authentication terminal is used for authenticating after receiving the verification request information sent by the block chain network, returning a private key to the block chain network after the authentication is passed, sending the private key to the property central control room device, and uploading data in a set time period to the cloud end for storage; and the property central control room device is used for receiving and displaying the sensor node information sent by the block chain.
The system further comprises a video collector, wherein the video collector is used for collecting the video information of the equipment at the node of the wireless sensor; the block chain network is also used for receiving the video information of the video collector; the property center control room device is also used for receiving and displaying the video information sent by the block chain and displaying the video information on the display.
Further, the authentication terminal is configured to perform delegation authentication after receiving the verification request information sent by the blockchain network, and includes the following steps:
SS1, the trustee generates information containing the trustee label identity to the credible third party, and the credible third party carries out authentication and stores the trustee information;
the SS2 is that the entrusted person sends the information label containing the hash value and the identity of the entrusted person to the checker for checking, and the checker generates a checker label after the checking is successful and sends the checker label to the trusted third party;
and SS3, the trusted third party performs the identity verification of the verifier and the trustee, if the identities of the verifier and the trustee are verified, the trusted third party judges whether the label is the same as the stored identity ID, judges the label is the identity of the trustee, then returns verification passing information to the verifier and the trustee, generates a session key between the verifier and the trustee, and completes the trustee authentication.
Further, the equipment operation parameters comprise one or more of equipment operation parameters including power supply and distribution information, elevator state information, water supply and drainage information, air supply and exhaust information, water accumulation information and public lighting information.
Further, in the block chain network, at least one branch node is used for negotiating with the property central control room device to establish an encryption channel;
the branch node is used for receiving the recorded data submitted by the property central control room device through the encryption channel, sending the recorded data to other nodes except the branch node in the block chain network, and returning the recorded data submission result to the property central control room device through the encryption channel according to the number of effective confirmation results returned by other nodes aiming at the recorded data;
the branch node is used for receiving a request for creating a new block sent by a specific user through an encryption channel, sending the new block to other nodes in a block chain network, and returning a result for creating the new block to the specific user according to a result of verifying the new block by the other nodes.
A key management method for intelligent cell equipment based on a block chain comprises the following steps:
s1, after the authentication terminal completes the identity authentication, the transaction request is sent to the transaction access device of the property central control room;
s2, the key management device receives the request initiated by the logic processing device, and acquires the corresponding key information according to the property central office device information, including the client private key and the transaction mechanism private key;
s3, the digital signature device receives the request initiated by the logic processing device, and carries out digital signature to the transaction data in turn according to the private key of the client and the private key of the transaction organization, and/or directly carries out digital signature to the transaction data according to the private key of the client;
s4, the data signature verification device receives the transaction request sent by the digital signature device and verifies the digital signature;
and S5, the block chain network receives the transaction data after the signature verification is successful, processes and stores the transaction data.
Further, in step S1, the identity authentication includes a delegation authentication, and the delegation generates a tag including information of the delegatee to a trusted third party, and the trusted third party performs the authentication by storing the information of the delegatee.
Further, the entrusted authentication includes the following steps:
s11, let user a select random number a, and calculate K ═ Ta(TS) mod p, K denotes the secret key of user A and the trusted third party, TaPublic key, T, representing ASIs the public key of a trusted third party, p is a large prime number, and then calculated h1=h(IDTg_A||PWTg_A||IDTg_B||tA),A=Ta(r) mod p, where IDTg_A,PWTg_ARespectively the identity and password of Tag A, tAIs a time stamp, h denotes a hash, h1Representing a hash value, IDTg_BIs the identity of Tag-B; a is the generated key, N, M is the intermediate variable respectively;
s12, sending h1,tAN, M, A to a trusted third party; the trusted third party, upon receipt of the information, calculates K' ═ Ts(A) mod p, K' represents the keys of user a and the trusted third party,ID'Tg_Arepresenting the anonymous identity of the Tag-a,ID'Tg_Brepresents the anonymous identity of the Tag-B, then according to ID'Tg_AFind out corresponding PW in databaseTg_A;
S13, calculating h1'=h(ID'Tg_A||PWTg_A||ID'Tg_B||tA),h1' denotes a suppressed hash value, if h1' and h1Equal, then the trusted third party will be (ID'Tg_B||ID'Tg_A) Stored in a database.
The invention has the beneficial effects that:
(1) the invention adds the block chain network in the management of the cell, and avoids the problems of interception and malicious tampering by entrusting and authenticating a third party encryption verification mode and the like, and the central control room can also remotely finish transaction entrusting, so that the system does not need to bear the key management task of the traditional public key password authentication, and the system overhead is reduced; by utilizing the advantages of decentralization, encryption and the like of the block chain technology, the intelligent community monitoring system is applied to equipment monitoring of the intelligent community, has the advantages of safety and resource saving, realizes intelligent community management and has great market value.
(2) The block chain carries out data encryption and decryption through various cryptography mechanisms, the basis of an ownership verification mechanism is an asymmetric encryption algorithm, a public key and a private key which are asymmetrically encrypted in the block chain are a cornerstone for constructing a whole trust system, a public key is used for expressing an address, a private key is used for signing a transaction, but the public key and the private key are difficult to store and the like.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a schematic structural diagram of the present invention.
Detailed Description
The technical solutions of the present invention are further described in detail below with reference to the accompanying drawings, but the scope of the present invention is not limited to the following. All of the features disclosed in this specification, or all of the steps of a method or process so disclosed, may be combined in any combination, except combinations where mutually exclusive features and/or steps are used.
Any feature disclosed in this specification (including any accompanying claims, abstract and drawings), may be replaced by alternative features serving equivalent or similar purposes, unless expressly stated otherwise. That is, unless expressly stated otherwise, each feature is only an example of a generic series of equivalent or similar features.
Specific embodiments of the present invention will be described in detail below, and it should be noted that the embodiments described herein are only for illustration and are not intended to limit the present invention. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be apparent to one of ordinary skill in the art that: it is not necessary to employ these specific details to practice the present invention. In other instances, well-known circuits, software, or methods have not been described in detail so as not to obscure the present invention.
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Before describing the embodiments, some necessary terms need to be explained. For example:
if the terms "first," "second," etc. are used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. Thus, a "first" element discussed below could also be termed a "second" element without departing from the teachings of the present invention. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. In contrast, when an element is referred to as being "directly connected" or "directly coupled" to another element, there are no intervening elements present.
The various terms appearing in this application are used for the purpose of describing particular embodiments only and are not intended as limitations of the invention, with the singular being intended to include the plural unless the context clearly dictates otherwise.
When the terms "comprises" and/or "comprising" are used in this specification, these terms are intended to specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence and/or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
As shown in fig. 1, a smart cell device monitoring system based on a block chain includes a sensor node device for acquiring device operation parameters of a smart cell; the block chain network is used for sending authentication request information to an authentication terminal to request to generate a verification mode of a key for authentication after receiving sensor information transmitted by the wireless sensor node; the authentication terminal is used for authenticating after receiving the verification request information sent by the block chain network, returning a private key to the block chain network after the authentication is passed, sending the private key to the property central control room device, and uploading data in a set time period to the cloud end for storage; and the property central control room device is used for receiving and displaying the sensor node information sent by the block chain.
The system further comprises a video collector, wherein the video collector is used for collecting the video information of the equipment at the node of the wireless sensor; the block chain network is also used for receiving the video information of the video collector; the property center control room device is also used for receiving and displaying the video information sent by the block chain and displaying the video information on the display.
Further, the authentication terminal is configured to perform delegation authentication after receiving the verification request information sent by the blockchain network, and includes the following steps:
SS1, the trustee generates information containing the trustee label identity to the credible third party, and the credible third party carries out authentication and stores the trustee information;
the SS2 is that the entrusted person sends the information label containing the hash value and the identity of the entrusted person to the checker for checking, and the checker generates a checker label after the checking is successful and sends the checker label to the trusted third party;
and SS3, the trusted third party performs the identity verification of the verifier and the trustee, if the identities of the verifier and the trustee are verified, the trusted third party judges whether the label is the same as the stored identity ID, judges the label is the identity of the trustee, then returns verification passing information to the verifier and the trustee, generates a session key between the verifier and the trustee, and completes the trustee authentication.
Further, the equipment operation parameters comprise one or more of equipment operation parameters including power supply and distribution information, elevator state information, water supply and drainage information, air supply and exhaust information, water accumulation information and public lighting information.
Further, in the block chain network, at least one branch node is used for negotiating with the property central control room device to establish an encryption channel;
the branch node is used for receiving the recorded data submitted by the property central control room device through the encryption channel, sending the recorded data to other nodes except the branch node in the block chain network, and returning the recorded data submission result to the property central control room device through the encryption channel according to the number of effective confirmation results returned by other nodes aiming at the recorded data;
the branch node is used for receiving a request for creating a new block sent by a specific user through an encryption channel, sending the new block to other nodes in a block chain network, and returning a result for creating the new block to the specific user according to a result of verifying the new block by the other nodes.
A key management method for intelligent cell equipment based on a block chain comprises the following steps:
s1, after the authentication terminal completes the identity authentication, the transaction request is sent to the transaction access device of the property central control room;
s2, the key management device receives the request initiated by the logic processing device, and acquires the corresponding key information according to the property central office device information, including the client private key and the transaction mechanism private key;
s3, the digital signature device receives the request initiated by the logic processing device, and carries out digital signature to the transaction data in turn according to the private key of the client and the private key of the transaction organization, and/or directly carries out digital signature to the transaction data according to the private key of the client;
s4, the data signature verification device receives the transaction request sent by the digital signature device and verifies the digital signature;
and S5, the block chain network receives the transaction data after the signature verification is successful, processes and stores the transaction data.
Further, in step S1, the identity authentication includes a delegation authentication, and the delegation generates a tag including information of the delegatee to a trusted third party, and the trusted third party performs the authentication by storing the information of the delegatee.
Further, the entrusted authentication includes the following steps:
s11, let user a select random number a, and calculate K ═ Ta(TS) mod p, K denotes the secret key of user A and the trusted third party, TaPublic key, T, representing ASIs the public key of a trusted third party, p is a large prime number, and then calculated h1=h(IDTg_A||PWTg_A||IDTg_B||tA),A=Ta(r) mod p, where IDTg_A,PWTg_ARespectively the identity and password of Tag A, tAIs a time stamp, h denotes a hash, h1Representing a hash value, IDTg_BIs the identity of Tag-B; a is the generated key, N, M is the intermediate variable respectively;
s12, sending h1,tAN, M, A to a trusted third party; the trusted third party, upon receipt of the information, calculates K' ═ Ts(A) modp, K' represents the key of user a and the trusted third party,ID'Tg_Arepresenting the anonymous identity of the Tag-a,ID'Tg_Brepresents the anonymous identity of the Tag-B, then according to ID'Tg_AFind out corresponding PW in databaseTg_A;
S13, calculating h1'=h(ID'Tg_A||PWTg_A||ID'Tg_B||tA),h1' denotes a suppressed hash value, if h1' and h1Equal, then the trusted third party will be (ID'Tg_B||ID'Tg_A) Stored in a database.
Example one
As shown in fig. 1, a smart cell device monitoring system based on a block chain includes a sensor node device for acquiring device operation parameters of a smart cell; the block chain network is used for sending authentication request information to an authentication terminal to request to generate a verification mode of a key for authentication after receiving sensor information transmitted by the wireless sensor node; the authentication terminal is used for authenticating after receiving the verification request information sent by the block chain network, returning a private key to the block chain network after the authentication is passed, sending the private key to the property central control room device, and uploading data in a set time period to the cloud end for storage; and the property central control room device is used for receiving and displaying the sensor node information sent by the block chain.
In other technical features of the embodiment, those skilled in the art can flexibly select and use the features according to actual situations to meet different specific actual requirements. However, it will be apparent to one of ordinary skill in the art that: it is not necessary to employ these specific details to practice the present invention. In other instances, well-known algorithms, methods or systems have not been described in detail so as not to obscure the present invention, and are within the scope of the present invention as defined by the claims.
For simplicity of explanation, the foregoing method embodiments are described as a series of acts or combinations, but those skilled in the art will appreciate that the present application is not limited by the order of acts, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and elements referred to are not necessarily required in this application.
Those of skill in the art would appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The disclosed systems, modules, and methods may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units may be only one logical division, and there may be other divisions in actual implementation, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be referred to as an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may also be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
It will be understood by those skilled in the art that all or part of the processes in the methods for implementing the embodiments described above can be implemented by instructing the relevant hardware through a computer program, and the program can be stored in a computer-readable storage medium, and when executed, the program can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a ROM, a RAM, etc.
The foregoing is illustrative of the preferred embodiments of this invention, and it is to be understood that the invention is not limited to the precise form disclosed herein and that various other combinations, modifications, and environments may be resorted to, falling within the scope of the concept as disclosed herein, either as described above or as apparent to those skilled in the relevant art. And that modifications and variations may be effected by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (8)
1. The utility model provides an wisdom district equipment monitored control system based on block chain which characterized in that includes:
the sensor node device is used for acquiring equipment operation parameters of the intelligent cell;
the block chain network is used for sending authentication request information to an authentication terminal to request to generate a verification mode of a key for authentication after receiving sensor information transmitted by the wireless sensor node;
the authentication terminal is used for authenticating after receiving the verification request information sent by the block chain network, returning a private key to the block chain network after the authentication is passed, sending the private key to the property central control room device, and uploading data in a set time period to the cloud end for storage;
and the property central control room device is used for receiving and displaying the sensor node information sent by the block chain.
2. The intelligent cell equipment monitoring system based on the block chain as claimed in claim 1, comprising a video collector for collecting video information of equipment at a wireless sensor node; the block chain network is also used for receiving the video information of the video collector; the property center control room device is also used for receiving and displaying the video information sent by the block chain and displaying the video information on the display.
3. The system according to claim 1 or 2, wherein the authentication terminal is configured to perform the authorization authentication after receiving the verification request message sent by the blockchain network, and includes the following steps:
SS1, the trustee generates information containing the trustee label identity to the credible third party, and the credible third party carries out authentication and stores the trustee information;
the SS2 is that the entrusted person sends the information label containing the hash value and the identity of the entrusted person to the checker for checking, and the checker generates a checker label after the checking is successful and sends the checker label to the trusted third party;
and SS3, the trusted third party performs the identity verification of the verifier and the trustee, if the identities of the verifier and the trustee are verified, the trusted third party judges whether the label is the same as the stored identity ID, judges the label is the identity of the trustee, then returns verification passing information to the verifier and the trustee, generates a session key between the verifier and the trustee, and completes the trustee authentication.
4. The intelligent block chain-based cell equipment monitoring system according to claim 3, wherein the equipment operation parameters include one or more of equipment operation parameters including power supply and distribution information, elevator status information, water supply and drainage information, air supply and exhaust information, water accumulation information, and public lighting information.
5. The intelligent device monitoring system for community based on block chain as claimed in claim 4, wherein in the block chain network, at least one branch node is used to negotiate with the property central office equipment to establish the encrypted channel;
the branch node is used for receiving the recorded data submitted by the property central control room device through the encryption channel, sending the recorded data to other nodes except the branch node in the block chain network, and returning the recorded data submission result to the property central control room device through the encryption channel according to the number of effective confirmation results returned by other nodes aiming at the recorded data;
the branch node is used for receiving a request for creating a new block sent by a specific user through an encryption channel, sending the new block to other nodes in a block chain network, and returning a result for creating the new block to the specific user according to a result of verifying the new block by the other nodes.
6. A key management method for intelligent cell equipment based on a block chain is characterized by comprising the following steps:
s1, after the authentication terminal completes the identity authentication, the transaction request is sent to the transaction access device of the property central control room;
s2, the key management device receives the request initiated by the logic processing device, and acquires the corresponding key information according to the property central office device information, including the client private key and the transaction mechanism private key;
s3, the digital signature device receives the request initiated by the logic processing device, and carries out digital signature to the transaction data in turn according to the private key of the client and the private key of the transaction organization, and/or directly carries out digital signature to the transaction data according to the private key of the client;
s4, the data signature verification device receives the transaction request sent by the digital signature device and verifies the digital signature;
and S5, the block chain network receives the transaction data after the signature verification is successful, processes and stores the transaction data.
7. The blockchain-based intelligent cell device key management method of claim 6, wherein the identity authentication includes a delegation authentication, and the delegation generates a tag including information of a delegatee to a trusted third party, and the trusted third party performs the authentication and stores the information of the delegatee for authentication in step S1.
8. The method of claim 7, wherein the delegating authentication comprises:
s11, let user a select random number a, and calculate K ═ Ta(TS) mod p, K denotes the secret key of user A and the trusted third party, TaPublic key, T, representing ASIs the public key of a trusted third party, p is a large prime number, and then calculated h1=h(IDTg_A||PWTg_A||IDTg_B||tA),A=Ta(r) mod p, where IDTg_A,PWTg_ARespectively the identity and password of Tag A, tAIs a time stamp, h denotes a hash, h1Representing a hash value, IDTg_BIs the identity of Tag-B; a is the generated key, N, M is the intermediate variable respectively;
s12, sending h1,tAN, M, A to a trusted third party; the trusted third party, upon receipt of the information, calculates K' ═ Ts(A) modp, K' represents the key of user a and the trusted third party,ID'Tg_Arepresenting the anonymous identity of the Tag-a,ID'Tg_Brepresents the anonymous identity of the Tag-B, then according to ID'Tg_AFind out corresponding PW in databaseTg_A;
S13, calculating h1'=h(ID'Tg_A||PWTg_A||ID'Tg_B||tA),h1' denotes a suppressed hash value, if h1' and h1Equal, then the trusted third party will be (ID'Tg_B||ID'Tg_A) Stored in a database.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911211234.XA CN110944301A (en) | 2019-12-02 | 2019-12-02 | Intelligent cell equipment monitoring system based on block chain and key management method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911211234.XA CN110944301A (en) | 2019-12-02 | 2019-12-02 | Intelligent cell equipment monitoring system based on block chain and key management method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110944301A true CN110944301A (en) | 2020-03-31 |
Family
ID=69908439
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911211234.XA Pending CN110944301A (en) | 2019-12-02 | 2019-12-02 | Intelligent cell equipment monitoring system based on block chain and key management method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110944301A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111581276A (en) * | 2020-03-31 | 2020-08-25 | 山东浪潮通软信息科技有限公司 | Enterprise IT supervision and management method, device and medium based on block chain |
CN111770089A (en) * | 2020-06-29 | 2020-10-13 | 福建福链科技有限公司 | Authentication method for blockchain sensor and blockchain network |
CN111769938A (en) * | 2020-06-29 | 2020-10-13 | 福建福链科技有限公司 | Key management system and data verification system of block chain sensor |
CN112255924A (en) * | 2020-10-16 | 2021-01-22 | 深圳拓邦股份有限公司 | Block chain-based household equipment management method and device and mobile chain-entering equipment |
CN112904734A (en) * | 2020-12-23 | 2021-06-04 | 上海上实龙创智能科技股份有限公司 | Intelligent household appliance control system and method based on Internet of things and block chain double gateways |
CN113009893A (en) * | 2021-03-02 | 2021-06-22 | 科瑞格建筑环境技术(北京)有限公司 | Block chain technology-based anti-seismic support and hanger state information safety control system |
CN114111808A (en) * | 2021-11-30 | 2022-03-01 | 上汽通用五菱汽车股份有限公司 | Positioning method, system and device of unmanned vehicle and readable storage medium |
CN114268633A (en) * | 2021-11-01 | 2022-04-01 | 北京交通大学 | Task-driven short-time block chain system and method |
CN117998316A (en) * | 2024-04-03 | 2024-05-07 | 广东裕太科技有限公司 | Block chain-based drainage monitoring system and method |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106452785A (en) * | 2016-09-29 | 2017-02-22 | 财付通支付科技有限公司 | Block chain network, branch node and block chain network application method |
US20170279774A1 (en) * | 2016-03-28 | 2017-09-28 | International Business Machines Corporation | Decentralized Autonomous Edge Compute Coordinated by Smart Contract On A Blockchain |
CN107249009A (en) * | 2017-08-02 | 2017-10-13 | 广东工业大学 | A kind of data verification method and system based on block chain |
CN107423647A (en) * | 2017-03-30 | 2017-12-01 | 重庆邮电大学 | A kind of RFID Entrusted authentication methods towards smart home |
CN107566117A (en) * | 2017-07-14 | 2018-01-09 | 浙商银行股份有限公司 | A kind of block chain key management system and method |
CN108632293A (en) * | 2018-05-16 | 2018-10-09 | 山东建筑大学 | Architectural Equipment Internet of things system based on block chain technology and method |
CN108810895A (en) * | 2018-07-12 | 2018-11-13 | 西安电子科技大学 | Wireless Mesh netword identity identifying method based on block chain |
CN109064591A (en) * | 2018-07-13 | 2018-12-21 | 安徽灵图壹智能科技有限公司 | A kind of block chain cell recognition of face entrance guard security system and its method |
CN110120868A (en) * | 2019-05-27 | 2019-08-13 | 浙江工商大学 | A kind of smart grid security data aggregation method and system based on block chain technology |
CN110443928A (en) * | 2019-08-19 | 2019-11-12 | 杭州宇链科技有限公司 | A kind of half centralization door-locking system based on block chain |
KR102044748B1 (en) * | 2019-07-30 | 2019-11-15 | 주식회사 바스랩 | System for providing blockchain electronic wallet capable of managing authentication information and storing personal information |
CN110490610A (en) * | 2019-07-25 | 2019-11-22 | 西安邮电大学 | A kind of community management system based on block chain |
-
2019
- 2019-12-02 CN CN201911211234.XA patent/CN110944301A/en active Pending
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170279774A1 (en) * | 2016-03-28 | 2017-09-28 | International Business Machines Corporation | Decentralized Autonomous Edge Compute Coordinated by Smart Contract On A Blockchain |
CN106452785A (en) * | 2016-09-29 | 2017-02-22 | 财付通支付科技有限公司 | Block chain network, branch node and block chain network application method |
CN107423647A (en) * | 2017-03-30 | 2017-12-01 | 重庆邮电大学 | A kind of RFID Entrusted authentication methods towards smart home |
CN107566117A (en) * | 2017-07-14 | 2018-01-09 | 浙商银行股份有限公司 | A kind of block chain key management system and method |
CN107249009A (en) * | 2017-08-02 | 2017-10-13 | 广东工业大学 | A kind of data verification method and system based on block chain |
CN108632293A (en) * | 2018-05-16 | 2018-10-09 | 山东建筑大学 | Architectural Equipment Internet of things system based on block chain technology and method |
CN108810895A (en) * | 2018-07-12 | 2018-11-13 | 西安电子科技大学 | Wireless Mesh netword identity identifying method based on block chain |
CN109064591A (en) * | 2018-07-13 | 2018-12-21 | 安徽灵图壹智能科技有限公司 | A kind of block chain cell recognition of face entrance guard security system and its method |
CN110120868A (en) * | 2019-05-27 | 2019-08-13 | 浙江工商大学 | A kind of smart grid security data aggregation method and system based on block chain technology |
CN110490610A (en) * | 2019-07-25 | 2019-11-22 | 西安邮电大学 | A kind of community management system based on block chain |
KR102044748B1 (en) * | 2019-07-30 | 2019-11-15 | 주식회사 바스랩 | System for providing blockchain electronic wallet capable of managing authentication information and storing personal information |
CN110443928A (en) * | 2019-08-19 | 2019-11-12 | 杭州宇链科技有限公司 | A kind of half centralization door-locking system based on block chain |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111581276A (en) * | 2020-03-31 | 2020-08-25 | 山东浪潮通软信息科技有限公司 | Enterprise IT supervision and management method, device and medium based on block chain |
CN111581276B (en) * | 2020-03-31 | 2023-04-07 | 浪潮通用软件有限公司 | Enterprise IT supervision and management method, device and medium based on block chain |
CN111770089A (en) * | 2020-06-29 | 2020-10-13 | 福建福链科技有限公司 | Authentication method for blockchain sensor and blockchain network |
CN111769938A (en) * | 2020-06-29 | 2020-10-13 | 福建福链科技有限公司 | Key management system and data verification system of block chain sensor |
CN111770089B (en) * | 2020-06-29 | 2022-04-08 | 福建福链科技有限公司 | Authentication method for blockchain sensor and blockchain network |
CN112255924A (en) * | 2020-10-16 | 2021-01-22 | 深圳拓邦股份有限公司 | Block chain-based household equipment management method and device and mobile chain-entering equipment |
CN112904734A (en) * | 2020-12-23 | 2021-06-04 | 上海上实龙创智能科技股份有限公司 | Intelligent household appliance control system and method based on Internet of things and block chain double gateways |
CN113009893A (en) * | 2021-03-02 | 2021-06-22 | 科瑞格建筑环境技术(北京)有限公司 | Block chain technology-based anti-seismic support and hanger state information safety control system |
CN114268633A (en) * | 2021-11-01 | 2022-04-01 | 北京交通大学 | Task-driven short-time block chain system and method |
CN114111808A (en) * | 2021-11-30 | 2022-03-01 | 上汽通用五菱汽车股份有限公司 | Positioning method, system and device of unmanned vehicle and readable storage medium |
CN117998316A (en) * | 2024-04-03 | 2024-05-07 | 广东裕太科技有限公司 | Block chain-based drainage monitoring system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110944301A (en) | Intelligent cell equipment monitoring system based on block chain and key management method | |
EP4120114A1 (en) | Data processing method and apparatus, smart device and storage medium | |
CN107959656B (en) | Data security guarantee system, method and device | |
CN109478223B (en) | Method and system for realizing block chain | |
KR101851261B1 (en) | Centralized remote metering system for security based on private block-chained data | |
TW201914254A (en) | Method, apparatus and system for data encryption and decryption | |
CN111092717A (en) | Group authentication-based safe and reliable communication method in smart home environment | |
CN111131336B (en) | Resource access method, device, equipment and storage medium under multi-party authorization scene | |
CN107172056A (en) | A kind of channel safety determines method, device, system, client and server | |
CN114710275B (en) | Cross-domain authentication and key negotiation method based on blockchain in Internet of things environment | |
CN109687965A (en) | The real name identification method of subscriber identity information in a kind of protection network | |
CN110519046A (en) | Quantum communications service station cryptographic key negotiation method and system based on disposable asymmetric key pair and QKD | |
CN109861956B (en) | Data verification system, method, device and equipment based on state channel | |
US11676111B1 (en) | Apparatuses and methods for determining and processing dormant user data in a job resume immutable sequential listing | |
CN100550030C (en) | On portable terminal host, add the method for credible platform | |
CN106713236A (en) | End-to-end identity authentication and encryption method based on CPK identifier authentication | |
CN112529573A (en) | Combined block chain threshold signature method and system | |
CN115953244A (en) | Transaction supervision method and device based on block chain, electronic equipment and storage medium | |
CN114091009B (en) | Method for establishing safety link by using distributed identity mark | |
CN115908001A (en) | Transaction supervision method and device based on block chain, electronic equipment and storage medium | |
CN114760071A (en) | Zero-knowledge proof based cross-domain digital certificate management method, system and medium | |
CN113591103B (en) | Identity authentication method and system between intelligent terminals of electric power Internet of things | |
CN111212026A (en) | Data processing method and device based on block chain and computer equipment | |
CN112422280B (en) | Man-machine control interaction method, interaction system, computer equipment and storage medium | |
Lu et al. | Transactive energy system deployment over insecure communication links |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200331 |
|
RJ01 | Rejection of invention patent application after publication |