CN113271294A - Edge computing gateway identity authentication method based on block chain technology - Google Patents

Edge computing gateway identity authentication method based on block chain technology Download PDF

Info

Publication number
CN113271294A
CN113271294A CN202110446176.XA CN202110446176A CN113271294A CN 113271294 A CN113271294 A CN 113271294A CN 202110446176 A CN202110446176 A CN 202110446176A CN 113271294 A CN113271294 A CN 113271294A
Authority
CN
China
Prior art keywords
identity
block chain
user
terminal
gateway
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110446176.XA
Other languages
Chinese (zh)
Inventor
许良
黄宇
黄静文
高厚臣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Qianhai Huazhao New Energy Co ltd
Original Assignee
Shenzhen Qianhai Huazhao New Energy Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Qianhai Huazhao New Energy Co ltd filed Critical Shenzhen Qianhai Huazhao New Energy Co ltd
Priority to CN202110446176.XA priority Critical patent/CN113271294A/en
Publication of CN113271294A publication Critical patent/CN113271294A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Biomedical Technology (AREA)
  • Data Mining & Analysis (AREA)
  • Bioethics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention belongs to the technical field of identity authentication, in particular to an edge computing gateway identity authentication method based on a block chain technology, which comprises the following steps: s1: generating a block chain private key and a block chain public key of a block chain seed according to a preset block chain key algorithm, wherein the block chain seed is generated by adopting a random number generator; calculating the block chain address of the block chain public key according to a block chain address generation algorithm; s2: and sending the personal information to an identity registration mechanism, and sending the identity information abstract, the block chain public key and the block chain address to a gateway identity service mechanism after receiving a verification passing message of the identity registration mechanism so that the gateway identity service mechanism generates a personal information gateway identity. The invention simplifies the authentication mode of the identity authentication of the blockchain organization, and can further prevent the counterfeit identity between different blockchain organizations because the gateway identities cannot be falsely used between different blockchain organizations.

Description

Edge computing gateway identity authentication method based on block chain technology
Technical Field
The invention relates to the technical field of identity authentication, in particular to an edge computing gateway identity authentication method based on a block chain technology.
Background
The current blockchain technology provides excellent privacy protection and point-to-point service for users by virtue of the advantages of distributed consensus, decentralized general ledger, asymmetric encryption and the like, and has attracted wide attention in various fields of industry 4.0. Along with the popularization of non-overlapped intelligent equipment in social life, such as intelligent factories, smart cities and smart homes, the privacy of users is more and more transparent. In order to strengthen personal information protection for users, realize data cooperation sharing among platforms in single fields and avoid the defects of high cost, high delay and low efficiency of a centralized platform, a distributed authentication system based on a block chain becomes a core technology for solving the problems.
However, the existing block chain technology-based edge computing gateway identity authentication method usually adopts a gateway certificate issued by a private authentication center to perform block chain organization identity authentication, which not only easily causes mutual identity falsifying between block chain organizations, but also only independently verifies the information of the gateway certificate issued by the private authentication center in the private identity authentication mode, and has the problem of low security.
Disclosure of Invention
Based on the technical problems provided in the background art, the invention provides an edge computing gateway identity authentication method based on a block chain technology.
The invention provides an edge computing gateway identity authentication method based on a block chain technology, which comprises the following steps:
s1: generating a block chain private key and a block chain public key of a block chain seed according to a preset block chain key algorithm, wherein the block chain seed is generated by adopting a random number generator; calculating the block chain address of the block chain public key according to a block chain address generation algorithm;
s2: sending the personal information to an identity registration mechanism, and sending the identity information abstract, the block chain public key and the block chain address to a gateway identity service mechanism after receiving a verification passing message of the identity registration mechanism so that the gateway identity service mechanism generates a personal information gateway identity;
s3: if the personal information gateway identity sent by the gateway identity service mechanism is received, sending a user registration request to a block chain authentication platform, wherein the first gateway identity application request is used for indicating the secondary authentication center to write the current organization information corresponding to the current organization identity into the root information of the gateway identity of the secondary authentication center, and generating the current gateway identity corresponding to the current organization identity;
s4: verifying whether the user is legal or not based on the personal information, and acquiring system chain information related to the user from a right chain node when the user is verified to be a legal user so as to verify whether the user has a function right of accessing a target application or not according to the system chain information and request parameters carried in the calling request;
s5: receiving an access request sent by a terminal, and acquiring user identity information carried by the access request; the user identity information comprises a user identification module ID, biological characteristics of a user and personal information of the user, the identity of the terminal is verified according to the user identification module ID, the biological characteristics of the user, the personal information of the user and pre-acquired public parameters of the terminal, and if the terminal passes the verification, the user identification module ID, the biological characteristics of the user and the personal information of the user are received and the authority is opened to the terminal;
s6: the block chain link point receives the user identification module ID, the biological characteristics of the user and the personal information of the user to acquire public key data; when the verification of the private key signature data is completed according to the public key data, acquiring equipment identification data of the user terminal and generating secret key data according to the equipment identification data; sending the key data to the user terminal; receiving authentication data submitted by the user terminal aiming at the key data; and when the authentication data submitted by the user terminal passes the verification, judging that the identity authentication passes.
Preferably, the user identification module ID and the biometric characteristic of the user are generated according to an asymmetric encryption algorithm, a master public key, a private key of the terminal, and an identification number of the terminal; wherein the identification number of the terminal is allocated by a network layer of the block chain after the terminal is successfully registered on the block chain.
Preferably, after accepting the user identification module ID and the biometric characteristic of the user and opening the right to the terminal, the method further includes: receiving a downloading request sent by the terminal, and acquiring information of required data carried by the downloading request; and acquiring the average time delay of the terminal for downloading the required data, and acquiring a cache path which enables the average time delay of the terminal for downloading the required data to be minimum according to a belief propagation algorithm.
Preferably, the receiving terminal node receives an identity authentication request, where the identity authentication request includes identity information of the terminal node; inquiring the identity authentication data of the terminal node in the edge server block chain according to the identity authentication request of the terminal node; and responding to the identity authentication request according to the identity authentication data.
Preferably, the system further comprises an encryption unit and a sending unit, wherein the encryption unit is used for carrying out double encryption on the personal information according to the block chain private key and the registration public key; and the sending unit is used for sending the double-encrypted personal information to the identity registration authority.
Preferably, the system further comprises a third sending module, configured to send the personal information gateway identity to a service system platform after sending the user registration request to the blockchain authentication platform, so that the service system platform sends an inquiry request to the blockchain authentication platform to verify whether the personal information gateway identity exists in a historical book of the blockchain authentication platform.
The beneficial effects of the invention are as follows:
1. the edge computing gateway identity authentication method based on the block chain technology comprises the steps of writing the current gateway identity into the block chain block of the current organization, sending an identity information authentication request to the chain link point of the identity block to be authenticated, wherein the identity information authentication request is used for indicating the chain link point of the identity block to be authenticated to return the corresponding gateway identity, finally, authenticating the organization identity of the chain link node of the identity block to be authenticated by the first organization node according to the returned gateway identity, obtaining the gateway identity by sending a gateway identity application request to the second-level authentication center, reducing the processing pressure of the authoritative authentication center, further obtaining the organization identity of the chain link node of the identity block to be authenticated by identifying the gateway identity, simplifying the authentication mode of block chain organization identity authentication, and avoiding the mutual misuse of the gateway identities among different block chain organizations, further, false identities between different blockchain organizations can be prevented.
2. According to the edge computing gateway identity authentication method based on the block chain technology, the ID of the user identification module is recorded into the identity information abstract, the ID of the user identification module corresponds to the personal information one by one, and if the personal information data of the identity registration mechanism is lost, the personal information can be reversely inquired through the ID of the user identification module and a user identification module verification mechanism so as to recover the data of the identity registration mechanism.
The parts of the device not involved are the same as or can be implemented using prior art.
Detailed Description
The technical solution of the present patent will be described in further detail with reference to the following embodiments.
Reference will now be made in detail to embodiments of the present patent, examples of which are illustrated in the accompanying documents, wherein like reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by reference to the documents are exemplary only for the purpose of explaining the present patent and are not to be construed as limiting the present patent.
In the description of this patent, it is to be understood that the terms "center," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," and the like are used in the positional or orientational relationships indicated by the documents to facilitate the description of the patent and to simplify the description, but are not intended to indicate or imply that the referenced device or element must have a particular orientation, be constructed and operated in a particular orientation, and are not to be construed as limiting the patent.
In the description of this patent, it is noted that unless otherwise specifically stated or limited, the terms "mounted," "connected," and "disposed" are to be construed broadly and can include, for example, fixedly connected, disposed, detachably connected, disposed, or integrally connected and disposed. The specific meaning of the above terms in this patent may be understood by those of ordinary skill in the art as appropriate.
The identity authentication method of the edge computing gateway based on the block chain technology comprises the following steps:
s1: generating a block chain private key and a block chain public key of a block chain seed according to a preset block chain key algorithm, wherein the block chain seed is generated by adopting a random number generator; calculating a block chain address of a block chain public key according to a block chain address generation algorithm;
s2: sending the personal information to an identity registration mechanism, receiving a verification passing message of the identity registration mechanism, and sending an identity information abstract, a block chain public key and a block chain address to a gateway identity service mechanism so that the gateway identity service mechanism generates a personal information gateway identity;
s3: if the personal information gateway identity sent by the gateway identity service mechanism is received, a user registration request is sent to the block chain authentication platform, the first gateway identity application request is used for indicating the secondary authentication center to write the current organization information corresponding to the current organization identity into the root information of the gateway identity of the secondary authentication center, and the current gateway identity corresponding to the current organization identity is generated;
s4: verifying whether the user is legal or not based on the personal information, and when the user is verified to be a legal user, acquiring system chain information related to the user from the right chain node so as to verify whether the user has the function right of accessing the target application or not according to the system chain information and request parameters carried in the calling request;
s5: receiving an access request sent by a terminal, and acquiring user identity information carried by the access request; the user identity information comprises a user identification module ID, biological characteristics of a user and personal information of the user, the identity of the terminal is verified according to the user identification module ID, the biological characteristics of the user, the personal information of the user and pre-acquired public parameters of the terminal, and if the terminal passes the verification, the user identification module ID, the biological characteristics of the user and the personal information of the user are received and the authority is opened to the terminal;
s6: the block chain link point receives a user identification module ID, biological characteristics of a user and personal information of the user to acquire public key data; when the verification of the private key signature data is completed according to the public key data, acquiring equipment identification data of the user terminal and generating secret key data according to the equipment identification data; sending the key data to the user terminal; receiving authentication data submitted by a user terminal aiming at the key data; and when the authentication data submitted by the user terminal passes the verification, judging that the identity authentication passes.
In the invention, a user identification module ID and the biological characteristics of a user are generated according to an asymmetric encryption algorithm, a master public key, a private key of a terminal and an identification number of the terminal; the identification number of the terminal is allocated by the network layer of the block chain after the terminal is successfully registered on the block chain.
The invention also includes following steps after receiving the ID of the user identification module and the biological characteristics of the user and opening the authority to the terminal: receiving a downloading request sent by a terminal, and acquiring information of required data carried by the downloading request; and acquiring the average time delay of the data required by the terminal downloading, and acquiring a cache path which enables the average time delay of the data required by the terminal downloading to be minimum according to a belief propagation algorithm.
In the invention, an identity authentication request of a terminal node is received, wherein the identity authentication request comprises identity information of the terminal node; inquiring the identity authentication data of the terminal node in the edge server block chain according to the identity authentication request of the terminal node; and responding to the identity authentication request according to the identity authentication data.
The invention also comprises an encryption unit and a sending unit, wherein the encryption unit is used for carrying out double encryption on the personal information according to the block chain private key and the registration public key; and the sending unit is used for sending the double-encrypted personal information to the identity registration authority.
The system comprises a third sending module and a block chain authentication platform, wherein the third sending module is used for sending a user registration request to the block chain authentication platform and then sending the personal information gateway identity to the service system platform, so that the service system platform can send a query request to the block chain authentication platform to verify whether the personal information gateway identity exists in a historical account book of the block chain authentication platform.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.

Claims (6)

1. The identity authentication method of the edge computing gateway based on the block chain technology is characterized by comprising the following steps:
s1: generating a block chain private key and a block chain public key of a block chain seed according to a preset block chain key algorithm, wherein the block chain seed is generated by adopting a random number generator; calculating the block chain address of the block chain public key according to a block chain address generation algorithm;
s2: sending the personal information to an identity registration mechanism, and sending the identity information abstract, the block chain public key and the block chain address to a gateway identity service mechanism after receiving a verification passing message of the identity registration mechanism so that the gateway identity service mechanism generates a personal information gateway identity;
s3: if the personal information gateway identity sent by the gateway identity service mechanism is received, sending a user registration request to a block chain authentication platform, wherein the first gateway identity application request is used for indicating the secondary authentication center to write the current organization information corresponding to the current organization identity into the root information of the gateway identity of the secondary authentication center, and generating the current gateway identity corresponding to the current organization identity;
s4: verifying whether the user is legal or not based on the personal information, and acquiring system chain information related to the user from a right chain node when the user is verified to be a legal user so as to verify whether the user has a function right of accessing a target application or not according to the system chain information and request parameters carried in the calling request;
s5: receiving an access request sent by a terminal, and acquiring user identity information carried by the access request; the user identity information comprises a user identification module ID, biological characteristics of a user and personal information of the user, the identity of the terminal is verified according to the user identification module ID, the biological characteristics of the user, the personal information of the user and pre-acquired public parameters of the terminal, and if the terminal passes the verification, the user identification module ID, the biological characteristics of the user and the personal information of the user are received and the authority is opened to the terminal;
s6: the block chain link point receives the user identification module ID, the biological characteristics of the user and the personal information of the user to acquire public key data; when the verification of the private key signature data is completed according to the public key data, acquiring equipment identification data of the user terminal and generating secret key data according to the equipment identification data; sending the key data to the user terminal; receiving authentication data submitted by the user terminal aiming at the key data; and when the authentication data submitted by the user terminal passes the verification, judging that the identity authentication passes.
2. The identity authentication method of the edge computing gateway based on the block chain technology as claimed in claim 1, wherein the user identification module ID, the biometric feature of the user are generated according to an asymmetric encryption algorithm, a master public key, a private key of the terminal, and an identification number of the terminal; wherein the identification number of the terminal is allocated by a network layer of the block chain after the terminal is successfully registered on the block chain.
3. The identity authentication method of an edge computing gateway based on a blockchain technology according to claim 1, further comprising after accepting the user identification module ID, the biometric feature of the user and opening the right to the terminal: receiving a downloading request sent by the terminal, and acquiring information of required data carried by the downloading request; and acquiring the average time delay of the terminal for downloading the required data, and acquiring a cache path which enables the average time delay of the terminal for downloading the required data to be minimum according to a belief propagation algorithm.
4. The method according to claim 3, wherein the receiving terminal node requests identity authentication, the identity authentication request includes identity information of the terminal node; inquiring the identity authentication data of the terminal node in the edge server block chain according to the identity authentication request of the terminal node; and responding to the identity authentication request according to the identity authentication data.
5. The identity authentication method of the edge computing gateway based on the blockchain technology according to claim 1, further comprising an encryption unit and a sending unit, wherein the encryption unit is used for performing double encryption on the personal information according to the blockchain private key and the registration public key; and the sending unit is used for sending the double-encrypted personal information to the identity registration authority.
6. The method of claim 4, further comprising a third sending module, configured to send the personal information gateway identity to a service system platform after the user registration request is sent to the blockchain authentication platform, so that the service system platform sends a query request to the blockchain authentication platform to verify whether the personal information gateway identity exists in the historical account book of the blockchain authentication platform.
CN202110446176.XA 2021-04-25 2021-04-25 Edge computing gateway identity authentication method based on block chain technology Pending CN113271294A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110446176.XA CN113271294A (en) 2021-04-25 2021-04-25 Edge computing gateway identity authentication method based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110446176.XA CN113271294A (en) 2021-04-25 2021-04-25 Edge computing gateway identity authentication method based on block chain technology

Publications (1)

Publication Number Publication Date
CN113271294A true CN113271294A (en) 2021-08-17

Family

ID=77229399

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110446176.XA Pending CN113271294A (en) 2021-04-25 2021-04-25 Edge computing gateway identity authentication method based on block chain technology

Country Status (1)

Country Link
CN (1) CN113271294A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019104690A1 (en) * 2017-11-30 2019-06-06 深圳前海达闼云端智能科技有限公司 Mobile network access authentication method, device, storage medium and block chain node
CN110086821A (en) * 2019-05-07 2019-08-02 国网江苏省电力有限公司无锡供电分公司 The authentication method of electric power things-internet gateway and the access of electric power internet-of-things terminal based on block chain
US20190288854A1 (en) * 2016-09-18 2019-09-19 Cloudminds (Shenzhen) Robotics Systems Co., Ltd. Blockchain-based identity authentication method, device, node and system
CN110505227A (en) * 2019-08-23 2019-11-26 国网江苏省电力有限公司无锡供电分公司 Power telecom network access authentication method and device based on block chain
CN111859348A (en) * 2020-07-31 2020-10-30 上海微位网络科技有限公司 Identity authentication method and device based on user identification module and block chain technology

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190288854A1 (en) * 2016-09-18 2019-09-19 Cloudminds (Shenzhen) Robotics Systems Co., Ltd. Blockchain-based identity authentication method, device, node and system
WO2019104690A1 (en) * 2017-11-30 2019-06-06 深圳前海达闼云端智能科技有限公司 Mobile network access authentication method, device, storage medium and block chain node
CN110086821A (en) * 2019-05-07 2019-08-02 国网江苏省电力有限公司无锡供电分公司 The authentication method of electric power things-internet gateway and the access of electric power internet-of-things terminal based on block chain
CN110505227A (en) * 2019-08-23 2019-11-26 国网江苏省电力有限公司无锡供电分公司 Power telecom network access authentication method and device based on block chain
CN111859348A (en) * 2020-07-31 2020-10-30 上海微位网络科技有限公司 Identity authentication method and device based on user identification module and block chain technology

Similar Documents

Publication Publication Date Title
CN113239382A (en) Credible identity model based on block chain intelligent contract
US8516259B2 (en) Verifying authenticity of voice mail participants in telephony networks
US20090046839A1 (en) Verifying authenticity of called party in telephony networks
CN107181765A (en) Network digital identity identifying method based on block chain technology
CN109040139A (en) A kind of identity authorization system and method based on block chain and intelligent contract
CN108881167A (en) A kind of intelligent contract of finite field block catenary system
WO2007005919A2 (en) System and method for security in global computer transactions that enable reverse-authentication of a server by a client
CN102790674A (en) Authentication method, equipment and system
CN101959183A (en) A kind of mobile subscriber identification code IMSI guard method based on assumed name
CN102420690A (en) Fusion and authentication method and system of identity and authority in industrial control system
CN106375308A (en) Hybrid cloud-oriented cross-cloud user authentication system
CN101345743A (en) Method and system for preventing network attack by utilizing address analysis protocol
CN112613006B (en) Power data sharing method and device, electronic equipment and storage medium
US9906501B2 (en) Publicly available protected electronic mail system
CN111444492A (en) Digital identity verification method based on medical block chain
CN109670825B (en) Digital asset real name registration system based on certificate association
CN102255916A (en) Access authentication method, device, server and system
CN108011873A (en) A kind of illegal connection determination methods based on set covering
CN115021989A (en) Mutual trust and mutual recognition method and system for industrial internet heterogeneous identification analysis system
CN112565294A (en) Identity authentication method based on block chain electronic signature
CN113919005B (en) Digital certificate issuing method based on Schnorr aggregate signature
CN111260348A (en) Fair payment system based on intelligent contract in Internet of vehicles and working method thereof
CN102164149A (en) Method for guarding against mapping cheat based on identifying separation mapping network
Kim et al. Can we create a cross-domain federated identity for the industrial Internet of Things without Google?
CN113271294A (en) Edge computing gateway identity authentication method based on block chain technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210817

WD01 Invention patent application deemed withdrawn after publication