CN111209558B - Internet of things equipment identity authentication method and system based on block chain - Google Patents

Internet of things equipment identity authentication method and system based on block chain Download PDF

Info

Publication number
CN111209558B
CN111209558B CN201911370765.3A CN201911370765A CN111209558B CN 111209558 B CN111209558 B CN 111209558B CN 201911370765 A CN201911370765 A CN 201911370765A CN 111209558 B CN111209558 B CN 111209558B
Authority
CN
China
Prior art keywords
equipment
internet
things
identity
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911370765.3A
Other languages
Chinese (zh)
Other versions
CN111209558A (en
Inventor
梅颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dawning Network Technology Co ltd
Original Assignee
Dawning Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dawning Network Technology Co ltd filed Critical Dawning Network Technology Co ltd
Priority to CN201911370765.3A priority Critical patent/CN111209558B/en
Publication of CN111209558A publication Critical patent/CN111209558A/en
Application granted granted Critical
Publication of CN111209558B publication Critical patent/CN111209558B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/76Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in application-specific integrated circuits [ASIC] or field-programmable devices, e.g. field-programmable gate arrays [FPGA] or programmable logic devices [PLD]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an Internet of things equipment identity authentication method and system based on a block chain, wherein the method comprises the following steps: implanting a physical unclonable function PUF circuit into an equipment chip of the Internet of things equipment; extracting fingerprint information of the Internet of things equipment through the PUF circuit to generate equipment identity of the Internet of things equipment, and writing the equipment identity into a block chain; after an equipment manufacturer transfers the ownership of the equipment of the internet of things to an equipment owner through a block chain, the equipment owner writes configuration information including control authority of the equipment of the internet of things into the block chain, so that other users can inquire equipment identities through the block chain and apply for access authority of the equipment of the internet of things. Through above-mentioned technical scheme, can ensure the authenticity and the integrality of equipment at least.

Description

Internet of things equipment identity authentication method and system based on block chain
Technical Field
The invention relates to the technical field of Internet of things, in particular to an Internet of things equipment identity authentication method and system based on a block chain.
Background
In the internet of things, an attacker can obtain the operation authority of the equipment by illegally stealing or tampering the identity of the equipment and impersonating the identity of a legal user, and further endanger the safety of a system and data and the interests of the legal user. In order to ensure that the internet of things equipment and the system can safely operate, a credible identity confirmation process is adopted to realize credible authentication of the internet of things equipment and credible confirmation of the identity of an operator, so that whether the user has corresponding access and use rights on the internet of things resources is determined, and then an access control strategy of the internet of things system can be reliably and effectively executed.
At present, various operations on equipment in solutions of the internet of things are usually based on account system services provided by equipment manufacturers (for example, operation permission is obtained after cloud identity authentication after logging in through a mobile phone APP), and due to the limitations of the identity authentication means of user names/passwords, in addition to diversity of the equipment manufacturers and difference in safety capabilities of the equipment manufacturers, certain potential safety hazards exist in the process of equipment identity authentication in these scenes, for example:
1. the equipment has a leak, cannot be updated timely, and is easy to inject malicious codes into an attacker to obtain the control authority of the equipment;
2. users are used to adopt weak passwords or manufacturer default passwords, so that the weak passwords or the manufacturer default passwords are easy to be cracked by attackers;
3. some devices are in an unattended environment and are easy to be captured by an attacker to acquire or tamper with device information;
disclosure of Invention
Aiming at the problems in the related art, the invention provides an Internet of things equipment identity authentication method and system based on a block chain. But for the thing networking system provides equipment authentication mechanism, can ensure the authenticity and the integrality of equipment.
The technical scheme of the invention is realized as follows:
according to one aspect of the invention, an identity authentication method for equipment of the internet of things based on a block chain is provided, which comprises the following steps:
s1, implanting a physical Unclonable Function (PUF-Physically Unclonable Function) circuit (hereinafter referred to as PUF circuit for short) into an equipment chip of the Internet of things equipment;
s2, extracting fingerprint information of the Internet of things equipment through the PUF circuit to generate equipment identity of the Internet of things equipment, and writing the equipment identity into a block chain;
s3, after the device manufacturer transfers the ownership of the internet of things device to the device owner through the blockchain, the device owner writes the configuration information of the internet of things device, which includes the control right, into the blockchain, so that other users query the device identity through the blockchain and apply for the access right of the internet of things device.
According to an embodiment of the present invention, S2 includes: extracting fingerprint information of the networked device through the PUF circuit; generating a corresponding public key according to the fingerprint information as a private key material; and the identity of the device is represented by a public key, and the private key material is only generated when the PUF circuit is activated and is not stored anywhere.
According to the embodiment of the present invention, after S3, the method further includes: a user searches for corresponding Internet of things equipment on the block chain; a user initiates a device access application; after checking the user identity, the equipment owner endows the user with corresponding authority and writes the authority into a block chain; and after obtaining the access right of the Internet of things equipment, the user directly communicates with the Internet of things equipment.
According to the embodiment of the present invention, after S3, the method further includes: when the Internet of things equipment needs to be upgraded, an equipment manufacturer writes an updating program into a position specified by an intelligent contract; after the equipment manufacturer triggers the intelligent contract, the Internet of things equipment downloads the updating program from the specified position according to the intelligent contract.
According to another aspect of the present invention, there is provided an internet of things device identity authentication system based on a block chain, including:
the production module is used for implanting a PUF circuit into an equipment chip of the Internet of things equipment;
the identity generation module is used for generating the equipment identity of the Internet of things equipment through the fingerprint information of the PUF circuit extraction networking equipment and writing the equipment identity into the block chain;
and the permission module is used for transferring the ownership of the Internet of things equipment to the equipment owner through the block chain, and is also used for writing the configuration information including the control permission of the Internet of things equipment into the block chain, so that other users can inquire the equipment identity through the block chain and apply for the access permission of the Internet of things equipment.
According to an embodiment of the invention, the identity generation module comprises: the fingerprint extraction unit is used for extracting fingerprint information of the networking equipment through the PUF circuit; the key generation unit is used for generating a corresponding public key according to the fingerprint information as a private key material; and representing the identity of the device with the public key, private key material being generated only when the PUF circuit is activated and not stored anywhere.
According to the embodiment of the present invention, the system for authenticating an identity of an internet of things device based on a block chain further includes a use module, configured to: searching corresponding Internet of things equipment on the block chain; initiating a device access application; after the user identity is examined, corresponding authority is given to the user and written into a block chain; after obtaining the access right of the Internet of things equipment, the user directly communicates with the Internet of things equipment.
According to the embodiment of the present invention, the system for authenticating an identity of an internet of things device based on a block chain further includes an upgrade module, configured to: when the Internet of things equipment needs to be upgraded, writing an updating program into a position specified by an intelligent contract; after triggering the intelligent contract, the Internet of things equipment downloads the updating program from the specified position according to the intelligent contract.
The invention utilizes the PUF to extract the chip fingerprint information of the equipment to generate the equipment identity, so that the identity information of the equipment has strong randomness and uniqueness. An attacker cannot predict and forge one having the same fingerprint information. Meanwhile, the identity information of the equipment is only generated by a corresponding circuit when the equipment is started, and the sensitive information of the equipment identity is not stored in the equipment, so that an attacker cannot acquire the sensitive information of the equipment identity through the capture equipment to forge the identity of the user;
the equipment identity information, the transfer of the control right of the equipment identity information and the access control authority are recorded on a distributed and tamper-proof block chain, the disclosure is transparent, and an attacker steals or forges the identity of a user on the premise that the block chain cannot be subverted, acquires the authority of a legal user and carries out destruction activities. The identity information, the configuration information and the access control authority of the equipment are stored on the block chain, the block chain is transparent and cannot be tampered, and the distributed structure of the block chain enables the block chain not to have the problem of single point failure;
the communication between the device and the user, and between the device and the device, is signed based on the private key of the public key password application device, so that the authenticity of the message is ensured. The private key of the device is never stored and transmitted, and an attacker cannot acquire the information of the private key of the device.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a flowchart of a block chain-based method for authenticating an identity of an internet of things device according to an embodiment of the present invention;
FIG. 2 is a schematic flow diagram of a generation phase according to an embodiment of the invention;
fig. 3 is a schematic flow chart of a network entry activation phase according to an embodiment of the present invention;
FIG. 4 is a schematic flow diagram of a use phase according to an embodiment of the invention;
FIG. 5 is a flow diagram of an upgrade phase according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of the present invention.
As shown in fig. 1, according to an embodiment of the present invention, there is provided a method for authenticating an identity of an internet of things device based on a block chain, including the following steps:
and S1, implanting a PUF circuit into the device chip of the Internet of things device. The internet of things equipment may be referred to simply as equipment hereinafter.
And S2, extracting the fingerprint information of the device through the PUF circuit to generate the device identity of the device, and writing the device identity into the block chain.
S3, after the device manufacturer transfers the ownership of the device to the device owner through the blockchain, the device owner writes the configuration information of the device including the control authority into the blockchain, so that other users can query the device identity and apply for the access authority of the device through the blockchain.
According to the technical scheme, the PUF is used for extracting the chip fingerprint information of the equipment to generate the equipment identity, so that the identity information of the equipment has strong randomness and uniqueness. An attacker cannot predict and forge one having the same fingerprint information. Meanwhile, the identity information of the equipment is only generated by the corresponding circuit when the equipment is started, and the sensitive information of the equipment identity is not stored in the equipment, so that an attacker cannot acquire the sensitive information of the equipment identity through the capture equipment to forge the identity of the user.
Particularly, the method realizes credible identity authentication and management on the equipment in the Internet of things, and can ensure the authenticity and integrity of the equipment by using effective technical means in all links of production, network access activation, use, upgrading and the like of the equipment in the Internet of things. Other aspects of the method of the present invention are described in detail below.
First, production stage
In the production stage of the Internet of things equipment, a PUF circuit is implanted into each equipment chip in the production process of each equipment chip, the physical unclonable function is a hardware function implementation circuit depending on chip characteristics and has uniqueness and randomness as a new hardware security primitive, fingerprint information representing equipment identity is generated by extracting process parameter deviation inevitably introduced in the chip manufacturing process, and the information is generated by the PUF circuit when the equipment is started and does not need to be stored on the equipment. The device generates a public and private key pair by the fingerprint information to participate in the blockchain transaction. The device manufacturer registers the device identity and update information on the blockchain. As shown in fig. 2, the process of the production stage comprises the following steps:
21. extracting a device fingerprint through the PUF;
22. generating a public key representing the identity of the equipment by using a public key generating function and taking the fingerprint as a private key material, wherein the private key material is only generated when the PUF circuit is activated and is not stored anywhere; therefore, chip fingerprints are extracted by the PUF, and a public and private key pair of the equipment is generated based on the fingerprint information;
23. the equipment manufacturer generates equipment related information and an updating contract;
24. the device manufacturer writes the device identity and related information into the blockchain.
Second, network access activation stage
When the use of the internet of things equipment is activated, the equipment manufacturer transfers the ownership of the equipment to the equipment owner through a blockchain control transfer transaction. The device owner writes configuration information such as access control of the device into the block chain, so that other users in the Internet of things can find the device and can apply for the access authority of the device to the device owner user. As shown in fig. 3, the process includes the steps of:
31. the equipment manufacturer transfers the control right of the equipment to the equipment owner through the control right transfer transaction;
32. the device owner writes configuration information such as access control of the device into the block chain.
Third, using stage
After the device is activated for network access, other users can publicly check the identity information of the device and the service provided by the device, and the owner of the device. And corresponding access right can be obtained by initiating an access application transaction to the owner of the device, once the access right of the device is obtained, direct communication can be carried out with the device, data provided by the device can be obtained, or the device can be controlled. As shown in fig. 4, the process includes the steps of:
41. a user searches equipment capable of providing corresponding service on a block chain;
42. a user initiates a device access application transaction;
43. the equipment owner examines the user identity, gives corresponding authority and writes the authority into the block chain;
44. the user access equipment and the equipment verify the user identity and the authority;
45. direct communication is performed between the user and the device.
Fourth, upgrade stage
And realizing automatic updating of the equipment through the intelligent contract. The equipment upgrading transaction is initiated by an equipment manufacturer, when upgrading is needed, the equipment manufacturer writes an updating program into a position appointed by a contract and triggers an intelligent contract for equipment upgrading, the equipment downloads a new upgrading program from a corresponding position according to the contract and verifies the authenticity and integrity of the upgrading program according to the contract, and the program is automatically updated after the program is run. As shown in fig. 5, the process includes the steps of:
51. the equipment manufacturer writes the updating program into a position specified by the intelligent contract;
52. triggering an intelligent contract by a device manufacturer;
53. the intelligent contract informs the equipment of updating the program;
54. the device downloads the program from the designated position according to the contract, and updates the program after verifying the authenticity and the integrity.
In summary, the invention utilizes the PUF to extract the chip fingerprint information of the device to generate the device identity, so that the identity information of the device has strong randomness and uniqueness. An attacker cannot predict and forge one having the same fingerprint information. Meanwhile, the identity information of the equipment is only generated by a corresponding circuit when the equipment is started, and the sensitive information of the equipment identity is not stored in the equipment, so that an attacker cannot acquire the sensitive information of the equipment identity through the capture equipment to forge the identity of the user;
the equipment identity information, the transfer of the control right of the equipment identity information and the access control authority are recorded on a distributed and tamper-proof block chain, the disclosure is transparent, and an attacker steals or forges the identity of a user on the premise that the block chain cannot be subverted, acquires the authority of a legal user and carries out destruction activities. The identity information, the configuration information and the access control authority of the equipment are stored on the block chain, the block chain is transparent and cannot be tampered, and the distributed structure of the block chain enables the block chain not to have the problem of single point failure;
the communication between the device and the user, and between the device and the device, is signed based on the private key of the public key password application device, so that the authenticity of the message is ensured. The private key of the device is never stored and transmitted, and an attacker cannot acquire the information of the private key of the device.
According to an embodiment of the present invention, there is also provided an internet of things device identity authentication system based on a block chain, including:
the production module is used for implanting a PUF circuit into an equipment chip of the Internet of things equipment;
the identity generation module is used for generating the equipment identity of the Internet of things equipment through the fingerprint information of the PUF circuit extraction networking equipment and writing the equipment identity into the block chain;
and the permission module is used for transferring the ownership of the Internet of things equipment to the equipment owner through the block chain, and is also used for writing the configuration information including the control permission of the Internet of things equipment into the block chain, so that other users can inquire the equipment identity through the block chain and apply for the access permission of the Internet of things equipment.
Wherein, the identity generating module may include: the fingerprint extraction unit is used for extracting fingerprint information of the networking equipment through the PUF circuit; the public key generation device is used for generating a corresponding public key according to the fingerprint information as a private key material; the public key is used for representing the identity of the equipment, and the private key material is only generated when the PUF circuit is activated and is not stored anywhere; and the identity writing unit is used for writing the equipment identity into the block chain.
In one embodiment, the system for identity authentication of internet of things devices based on a blockchain may further include a use module configured to: searching corresponding Internet of things equipment on the block chain; initiating a device access application; after the user identity is examined, corresponding authority is given to the user and written into a block chain; after obtaining the access right of the Internet of things equipment, the user directly communicates with the Internet of things equipment.
In one embodiment, the system for authenticating an identity of an internet of things device based on a blockchain further includes an upgrade module, configured to: when the Internet of things equipment needs to be upgraded, writing an updating program into a position specified by an intelligent contract; after triggering the intelligent contract, the Internet of things equipment downloads the updating program from the specified position according to the intelligent contract.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (7)

1. An Internet of things equipment identity authentication method based on a block chain is characterized by comprising the following steps:
s1, implanting a physical unclonable function PUF circuit into an equipment chip of the Internet of things equipment;
s2, extracting fingerprint information of the Internet of things equipment through the PUF circuit, generating a corresponding public key according to the fingerprint information as a private key material, and representing the identity of the equipment through the public key, wherein the private key material is only generated when the PUF circuit is activated and is not stored anywhere, and then the equipment manufacturer writes the equipment identity into the block chain;
s3, after a device manufacturer transfers ownership of the internet of things device to a device owner through a blockchain, the device owner writes configuration information of the internet of things device, which includes control permissions, into the blockchain, so that other users query the device identity through the blockchain and apply for access permissions of the internet of things device.
2. The identity authentication method of the equipment of the internet of things based on the blockchain according to claim 1, further comprising after S3:
a user searches for corresponding Internet of things equipment on the block chain;
the user initiates a device access application;
after checking the user identity, the equipment owner endows the user with corresponding authority and writes the authority into the block chain;
and after obtaining the access right of the Internet of things equipment, the user directly communicates with the Internet of things equipment.
3. The identity authentication method of the equipment of the internet of things based on the blockchain according to claim 1, further comprising after S3:
when the Internet of things equipment needs to be upgraded, the equipment manufacturer writes an updating program into a position specified by an intelligent contract;
after the device manufacturer triggers the intelligent contract, the Internet of things device downloads the updating program from the specified position according to the intelligent contract.
4. The utility model provides a thing networking equipment identity authentication system based on block chain which characterized in that includes:
the production module is used for implanting a physical unclonable function PUF circuit into an equipment chip of the Internet of things equipment;
the identity generation module is used for extracting fingerprint information of the Internet of things equipment through the PUF circuit to generate equipment identity of the Internet of things equipment and writing the equipment identity into a block chain, wherein the identity generation module comprises a key generation unit which is used for generating a corresponding public key according to the fingerprint information as a private key material and representing the identity of the equipment by using the public key, and the private key material is only generated when the PUF circuit is activated and is not stored anywhere;
and the permission module is used for transferring the ownership of the Internet of things equipment to an equipment owner through a block chain, and is also used for writing the configuration information of the Internet of things equipment, including the control permission, into the block chain so that other users can inquire the equipment identity through the block chain and apply for the access permission of the Internet of things equipment.
5. The system of claim 4, wherein the identity generation module further comprises:
the fingerprint extraction unit is used for extracting fingerprint information of the Internet of things equipment through the PUF circuit;
and the identity writing unit is used for writing the equipment identity into the block chain.
6. The system of claim 5, further comprising a usage module configured to:
searching corresponding Internet of things equipment on the block chain;
initiating a device access application;
after checking the user identity, endowing the user with corresponding authority, and writing the authority into the block chain;
and after obtaining the access right of the Internet of things equipment, the user directly communicates with the Internet of things equipment.
7. The system of claim 4, further comprising an upgrade module configured to:
when the Internet of things equipment needs to be upgraded, writing an updating program into a position specified by an intelligent contract;
after triggering the intelligent contract, the Internet of things equipment downloads the updating program from the specified position according to the intelligent contract.
CN201911370765.3A 2019-12-26 2019-12-26 Internet of things equipment identity authentication method and system based on block chain Active CN111209558B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911370765.3A CN111209558B (en) 2019-12-26 2019-12-26 Internet of things equipment identity authentication method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911370765.3A CN111209558B (en) 2019-12-26 2019-12-26 Internet of things equipment identity authentication method and system based on block chain

Publications (2)

Publication Number Publication Date
CN111209558A CN111209558A (en) 2020-05-29
CN111209558B true CN111209558B (en) 2022-05-13

Family

ID=70784078

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911370765.3A Active CN111209558B (en) 2019-12-26 2019-12-26 Internet of things equipment identity authentication method and system based on block chain

Country Status (1)

Country Link
CN (1) CN111209558B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112100607A (en) * 2020-11-09 2020-12-18 南京可信区块链与算法经济研究院有限公司 Verification system and method for block chain hardware equipment
CN114491430A (en) * 2020-11-13 2022-05-13 支付宝(杭州)信息技术有限公司 Service processing method, device and equipment based on block chain
CN113378148A (en) * 2021-06-09 2021-09-10 永旗(北京)科技有限公司 Internet of things equipment identity authentication system and method based on block chain
CN115694847A (en) * 2021-07-22 2023-02-03 华为技术有限公司 Equipment management method, system and device
CN113708935B (en) * 2021-08-23 2022-09-13 北京航空航天大学 Internet of things equipment unified authentication method and system based on block chain and PUF
WO2023082190A1 (en) * 2021-11-12 2023-05-19 华为技术有限公司 Device authentication method and apparatus
CN114168176A (en) * 2021-12-15 2022-03-11 四川启睿克科技有限公司 Block chain-based cross-manufacturer equipment upgrading system and method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014175721A1 (en) * 2013-04-25 2014-10-30 Mimos Berhad A system and method for privacy management for internet of things services
CN105323069A (en) * 2014-07-31 2016-02-10 中国科学院数据与通信保护研究教育中心 Authentication method and equipment based on PUF (Physically Unclonable Function)
CN109918878A (en) * 2019-04-24 2019-06-21 中国科学院信息工程研究所 A kind of industrial internet of things equipment authentication and safety interacting method based on block chain
CN110049141A (en) * 2019-05-24 2019-07-23 南京工程学院 Internet of Things distributed authentication method and its framework based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014175721A1 (en) * 2013-04-25 2014-10-30 Mimos Berhad A system and method for privacy management for internet of things services
CN105323069A (en) * 2014-07-31 2016-02-10 中国科学院数据与通信保护研究教育中心 Authentication method and equipment based on PUF (Physically Unclonable Function)
CN109918878A (en) * 2019-04-24 2019-06-21 中国科学院信息工程研究所 A kind of industrial internet of things equipment authentication and safety interacting method based on block chain
CN110049141A (en) * 2019-05-24 2019-07-23 南京工程学院 Internet of Things distributed authentication method and its framework based on block chain

Also Published As

Publication number Publication date
CN111209558A (en) 2020-05-29

Similar Documents

Publication Publication Date Title
CN111209558B (en) Internet of things equipment identity authentication method and system based on block chain
CN108632253B (en) Client data security access method and device based on mobile terminal
JP5852265B2 (en) COMPUTER DEVICE, COMPUTER PROGRAM, AND ACCESS Permission Judgment Method
US20130268444A1 (en) Three-factor user authentication method for generating otp using iris information and secure mutual authentication system using otp authentication module of wireless communication terminal
CN110891257B (en) Internet-connected vehicle remote upgrading system and method with anti-attack bidirectional authentication
CN111431707B (en) Service data information processing method, device, equipment and readable storage medium
US9608966B2 (en) Information handling device, information output device, and recording medium
CN109634619A (en) Credible performing environment implementation method and device, terminal device, readable storage medium storing program for executing
CN112765684B (en) Block chain node terminal management method, device, equipment and storage medium
CN111787116B (en) System and method for trusted authentication of container mirror image based on block chain technology
CN108335105B (en) Data processing method and related equipment
WO2015001376A1 (en) Signatures for near field communications
CN106133739A (en) Data are to the safeguard protection of the loading in the nonvolatile memory of safety element
US7693675B2 (en) Method for protection of sensor node's data, a systems for secure transportation of a sensor node and a sensor node that achieves these
CN102523095A (en) User digital certificate remote update method with intelligent card protection function
CN110278084B (en) eID establishing method, related device and system
CN112712372A (en) Alliance chain cross-chain system and information calling method
CN110838919B (en) Communication method, storage method, operation method and device
CN110266641B (en) Information reading method, system, device and computer readable storage medium
CN109474431A (en) Client certificate method and computer readable storage medium
CN109246062A (en) A kind of authentication method and system based on browser plug-in
CN115550002B (en) TEE-based intelligent home remote control method and related device
CN111444496A (en) Application control method, device, equipment and storage medium
CN104852904A (en) Server remote restart method based on mobile phone APP and encrypted short message
US9633207B2 (en) Method for downloading at least one software component onto a computing device, and associated computer program product, computing device and computer system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant