CN116455674B - User identity information management method based on block chain - Google Patents

User identity information management method based on block chain Download PDF

Info

Publication number
CN116455674B
CN116455674B CN202310653700.XA CN202310653700A CN116455674B CN 116455674 B CN116455674 B CN 116455674B CN 202310653700 A CN202310653700 A CN 202310653700A CN 116455674 B CN116455674 B CN 116455674B
Authority
CN
China
Prior art keywords
client
server
identity information
edge server
edge
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310653700.XA
Other languages
Chinese (zh)
Other versions
CN116455674A (en
Inventor
魏大鹏
周长林
白宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin Urban Planning And Design Institute Co ltd
Original Assignee
Tianjin Urban Planning And Design Institute Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin Urban Planning And Design Institute Co ltd filed Critical Tianjin Urban Planning And Design Institute Co ltd
Priority to CN202310653700.XA priority Critical patent/CN116455674B/en
Publication of CN116455674A publication Critical patent/CN116455674A/en
Application granted granted Critical
Publication of CN116455674B publication Critical patent/CN116455674B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention provides a user identity information management method based on a blockchain, and belongs to the field of smart cities. The terminal of the Internet of things classifies according to different classification standards: the function classification divides the function classification into sensor nodes, actuator nodes, intermediate nodes, edge nodes and the like; the communication technology classification is divided into WI-FI terminals, zigBee terminals, loRa terminals, NB-loT terminals and the like; the power supply modes are classified into battery power supply terminals, solar power supply terminals, power grid power supply terminals and the like; the application scene classification divides the application scene classification into a household terminal, a medical terminal, an industrial terminal, a traffic terminal and the like, and the internet of things terminals can not finish a safe login process due to the limitation of resources in different aspects. Based on the method, the device and the system, the related services of the server can be safely accessed by the clients of different types.

Description

User identity information management method based on block chain
Technical Field
The invention belongs to the field of smart cities, and particularly relates to a user identity information management method based on a blockchain.
Background
The smart city is a new theory and a new mode for promoting city planning, construction, management and service intelligence by applying new generation information integration technologies such as Internet of things, cloud computing, big data, space geographic information integration and the like. Cities consist of six core systems of different types of networks, infrastructure and environments that relate to the main functions of the city: organization, business, traffic, communication, water, and energy. These systems are not sporadic but rather are linked to each other in a coordinated manner. The city itself is a macroscopic system composed of these systems.
The construction requirement of the smart city is that the application of comprehensive perception, ubiquitous Internet, ubiquitous computing and fusion is realized through the application of new generation information technologies such as the Internet of things and cloud computing represented by mobile technology. Building a smart city is a need to realize sustainable development of cities and development of information technology.
In the prior art, for security, the login process of the client access server of the smart city system is shown in fig. 1, and the principle of user name and password login is as follows:
1. the client initiates a login request to the server, and the server returns a public key;
2. the client encrypts the authentication information by using the public key and sends the authentication information to the server;
3. the server decrypts the authentication information sent by the client by using the private key, and if the authentication information is matched with the client, the login is successful, otherwise, the login fails.
The login process is a proper login method for devices with higher operation capacity such as a PC, a server or a mobile phone.
However, in the smart city field, there are a large number of terminals of the internet of things, and the terminals of the internet of things can be classified according to different classification standards, and the following common classification methods are as follows:
functional classification: according to the functions of the terminal, the terminal can be divided into a sensor node, an actuator node, an intermediate node, an edge node and the like;
classification of communication technology: according to the communication technology used by the terminal, the terminal can be divided into Wi-Fi terminal, zigBee terminal, loRa terminal, NB-IoT terminal and the like;
classifying power supply modes: according to the power supply mode of the terminal, the terminal can be divided into a battery power supply terminal, a solar power supply terminal, a power grid power supply terminal and the like;
application scene classification: the terminal may be classified into a home terminal, a medical terminal, an industrial terminal, a traffic terminal, and the like according to the application scene of the terminal.
The above-mentioned terminals of the internet of things cannot complete the secure login process shown in fig. 1 due to the limitation of resources in different aspects.
Therefore, in the smart city field, there is a need for an identity information management method that can implement differentiation for different types of clients, so as to implement that all the different types of clients can safely access the related services of the server.
Disclosure of Invention
In view of this, the present invention proposes a method for managing identity information, which can implement differentiation for different types of clients, so that the different types of clients can safely access the related services of the server, and specifically includes:
a user identity information management method based on a block chain, wherein an information system is set to be of a 3-layer structure and comprises a cloud service layer, an edge service layer and an end user layer, and the method mainly comprises the following steps:
s1, dividing clients into two types, namely a high-resource client and a low-resource client according to the difference of computing resources of each terminal of a terminal user layer;
s2, setting identity information for the client in advance, and setting two information of a device-ID and a password by the high-resource client; when the low-resource client is connected with the edge server of the edge service layer for the first time, the connected edge server sets the following information: device-ID, server-ID, h=hash (device-ID), device-ID is a client ID, server-ID is an ID of an edge server connected to the client, function hash () may be a hash function in the prior art, the client retaining device-ID and H value; the edge server connected with the client reserves a device-ID and a hash (), and the edge server publishes the information of the device-ID and the server-ID through a blockchain;
s3, when the client logs in the application server, connection with a certain edge server is established, and a login request message is sent to the application server, wherein the login request message comprises the client type and the identity information;
s4, after receiving the login request message, the edge server judges the type of the client, if the client is a high-resource client, the edge server requests a public key from an application server of a cloud service layer, after the request is successful, the edge server sends the public key to the client, the client encrypts own identity information by using the public key and sends the identity information to the server through the edge server, the server decrypts the identity information sent by the client by using a private key, if the identity information is matched, the login is successful, otherwise, the process is failed, and the flow is ended;
s5, if the client type is a low-resource client, after receiving the device-ID and the H value, the edge server obtains a server-ID corresponding to the device-ID by inquiring the blockchain, sends an authentication request message to the edge server corresponding to the server-ID, wherein the authentication request message comprises the device-ID, the edge server receiving the authentication request message calculates h=hash (device-ID), feeds the H value back to the edge server sending the authentication request message, and if the H value is matched with the H value, the edge server sending the authentication request message informs the application server of the cloud service layer of allowing the client to log in, otherwise, the process is failed, and the process is ended.
Further, the high-resource client in step S1 includes: the system comprises a PC, a server and a mobile phone; the low-resource client is an Internet of things device with insufficient computing resources.
Furthermore, in step S2, the two information of the device-ID and the password set by the high-resource client are simultaneously mastered by the application server and the client in the cloud service layer.
Further, in step S2, the hash function hash (), the formulas set by different edge servers are different.
Further, in step S2, the hash function hash (), the formulas set by different edge servers for different low-resource clients are different.
Further, in step S3, the login request message includes two fields: the first field is a client type, the second field is client identity information, the client type can be set through a 1bit flag bit, 1 is a high resource client, 0 is a low resource client, and the client identity information is the preset identity information.
The beneficial effects brought by the invention and the prior art are as follows:
the user identity information management method based on the blockchain can realize differentiated identity information management methods for different types of clients, so that the different types of clients can safely access related services of the server.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention. In the drawings:
FIG. 1 is a schematic diagram of a client secure login process in the prior art;
fig. 2 is a schematic diagram of a 3-layer structure of an information system according to an embodiment of the present invention.
Detailed Description
It should be noted that, without conflict, the embodiments of the present invention and features of the embodiments may be combined with each other.
The invention will be described in detail below with reference to the drawings in connection with embodiments.
In the smart city field, the information system is set to a 3-layer structure, and a layer of edge servers are further provided between the client and the server, as shown in fig. 2. The intelligent city information system comprises a cloud service layer, an edge service layer and an end user layer, and is interconnected and intercommunicated through the Internet. A user identity information management method based on block chain mainly comprises the following steps:
1. the clients are divided into two types according to the difference of computing resources of the clients, namely, high-resource clients (PC, server, mobile phone and other devices) and low-resource clients (Internet of things devices with insufficient computing resources).
2. Identity information is preset for the client. For the high-resource client, two pieces of information, namely a device-ID and a password, are set, and the information is simultaneously mastered by an application server and the client in the cloud service layer. When the low-resource client is connected with the edge server for the first time, the edge server sets the following information: device-ID, server-ID, h=hash (device-ID); the device-ID is a client ID, the server-ID is an ID of an edge server connected to the client, the function hash () may be a hash function, and then the client is allowed to retain the device-ID and the H value; the edge server connected to the client retains the device-ID and the hash () algorithm, and then the edge server publishes the information of the device-ID and the server-ID through the blockchain (how to publish the information through the blockchain technique belongs to the prior art, and is not described in detail).
3. When a client needs to log on to an application server, a connection with a certain edge server is first established (the edge server is not necessarily the edge server connected for the first time, and when the client has a requirement of transmitting data, a mode of selecting the edge server can be implemented by using a conventional method in the prior art, which belongs to the prior art and is not explained in detail here), and a login request message is sent to the client, where the login request message includes at least two fields: the first field is a client type and the second field is client identity information. The terminal type may be set by a 1bit flag bit, 1 being a high resource client and 0 being a low resource client. When the client is a high-resource client, the identity information is a device-ID and a password; when the client is a low resource client, the identity information is the device-ID and H value.
4. After receiving the login request message, the edge server reads the client type field, if the client type field is 1, step 5 is executed, and if the client type field is 0, step 6 is executed.
5. The edge server requests the public key from the application server, the application server sends the public key to the edge server, the edge server sends the public key to the client, the client encrypts the identity information of the client by using the public key, the client sends the public key to the server through the edge server, the server decrypts the identity information sent by the client by using the private key, the login is successful if the public key is matched, otherwise the public key is failed, and the process is ended.
6. After receiving the device-ID and the H value, the edge server obtains a server-ID corresponding to the device-ID by querying the blockchain network, sends an authentication request message to the edge server corresponding to the server-ID, wherein the message comprises the device-ID, the edge server receiving the authentication request message calculates h=hash (device-ID), feeds back the H value to the edge server sending the authentication request message, and if the H value is matched with the H value, the edge server sending the authentication request message informs the application server to allow the client to log in, otherwise, the client fails.
Specific application examples are as follows:
the client of the smart city system is provided with a PC, a power grid power supply terminal and the like, wherein the PC is a high-resource client, and the device-ID is zhcsp 1; the power supply terminal of a certain power grid is a low-resource client, and the device-ID is dianwang2.
When a PC logs in an application server, connection with a certain edge server is established firstly, a login request message is sent, the identity information of a client in the login request message is zhcsp 1 and a password, after input is completed, the edge server requests a public key to the application server, after the application server sends the public key to the edge server, the edge server sends the public key to the PC, the PC encrypts the zhcsp 1 and the password by using the public key, the PC sends the encrypted information to a server through the edge server, and the server decrypts the encrypted information sent by the PC by using a private key to obtain the ID of the client: the zhcsp 1 and the password are compared with the device-ID and the password stored in the server, if the matching is successful, the process is ended if the matching is not successful.
When a power grid power supply terminal logs in an application server, connection with a certain edge server is established firstly, a login request message is sent, client identity information in the login request message is a dianwang2 value and an H value, after the edge server receives a device-ID and the H value, the edge server obtains a server-ID corresponding to the dianwang2 by inquiring a blockchain network, an authentication request message is sent to the edge server corresponding to the server-ID, the message comprises the dianwang2, the edge server receiving the authentication request message feeds back H value to the edge server sending the authentication request message by calculating h=hash (dianwang 2), the edge server sending the authentication request message is informed of the application server to allow the client to log in by comparing H and H value if matching, and if failure occurs, the process is ended.
The foregoing description of the preferred embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, alternatives, and improvements that fall within the spirit and scope of the invention.

Claims (4)

1. A user identity information management method based on block chain, wherein the information system is set to a 3-layer structure, comprising a cloud service layer, an edge service layer and an end user layer, is characterized in that,
the method comprises the following steps:
s1, dividing clients into two types according to the difference of computing resources of each terminal of a user layer of the terminal, wherein the high-resource clients comprise a PC, a server and a mobile phone; the low-resource client comprises Internet of things equipment with insufficient computing resources;
s2, setting identity information for the client in advance, setting two pieces of information of a device-ID and a password by the high-resource client, and simultaneously mastering the two pieces of information of the device-ID and the password set by the high-resource client by an application server and the client in a cloud service layer; when the low-resource client is connected with the edge server of the edge service layer for the first time, the connected edge server sets the following information: device-ID, server-ID, h=hash (device-ID), device-ID is client ID, server-ID is ID of edge server connected to the client, function hash () is hash function, the client retains device-ID and H value; the edge server connected with the client reserves a device-ID and a hash (), and the edge server publishes the information of the device-ID and the server-ID through a blockchain;
s3, when the client logs in the application server, connection with a certain edge server is established, and a login request message is sent to the edge server; the login request message comprises a client type and the identity information;
s4, after receiving the login request message, the edge server judges the type of the client, if the client is a high-resource client, the edge server requests a public key from an application server of a cloud service layer, after the request is successful, the edge server sends the public key to the client, the client encrypts own identity information by using the public key and sends the identity information to the server through the edge server, the server decrypts the identity information sent by the client by using a private key, if the identity information is matched, the login is successful, otherwise, the process is failed, and the flow is ended;
s5, if the client type is a low-resource client, after receiving the device-ID and the H value, the edge server obtains a server-ID corresponding to the device-ID by inquiring the blockchain, sends an authentication request message to the edge server corresponding to the server-ID, wherein the authentication request message comprises the device-ID, the edge server receiving the authentication request message calculates h=hash (device-ID), feeds the H value back to the edge server sending the authentication request message, and if the H value is matched with the H value, the edge server sending the authentication request message informs the application server of the cloud service layer of allowing the client to log in, otherwise, the process is failed, and the process is ended.
2. The blockchain-based user identity information management method of claim 1, wherein the hash function hash () in step S2 is different from formulas set by different edge servers.
3. The blockchain-based user identity information management method of claim 2, wherein the hash function hash (), in step S2, the formulas set by different edge servers for different low-resource clients are all different.
4. The blockchain-based user identity information management method of claim 1, wherein the login request message in step S3 includes two fields: the first field is a client type, the second field is client identity information, the client type is set through a 1bit flag bit, 1 is a high resource client, 0 is a low resource client, and the client identity information is preset in step S2.
CN202310653700.XA 2023-06-05 2023-06-05 User identity information management method based on block chain Active CN116455674B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310653700.XA CN116455674B (en) 2023-06-05 2023-06-05 User identity information management method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310653700.XA CN116455674B (en) 2023-06-05 2023-06-05 User identity information management method based on block chain

Publications (2)

Publication Number Publication Date
CN116455674A CN116455674A (en) 2023-07-18
CN116455674B true CN116455674B (en) 2023-08-18

Family

ID=87125862

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310653700.XA Active CN116455674B (en) 2023-06-05 2023-06-05 User identity information management method based on block chain

Country Status (1)

Country Link
CN (1) CN116455674B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106790259A (en) * 2017-01-25 2017-05-31 国家电网公司 A kind of asymmetric across cryptographic system re-encryption, decryption method and system
KR101829721B1 (en) * 2016-11-03 2018-03-29 주식회사 코인플러그 Method for certifying a user by using mobile id through blockchain, and terminal and server using the same
US10805085B1 (en) * 2017-08-24 2020-10-13 United Services Automobile Association (Usaa) PKI-based user authentication for web services using blockchain
CN113079159A (en) * 2021-04-01 2021-07-06 北京邮电大学 Edge computing network architecture based on block chain
CN114124956A (en) * 2021-11-17 2022-03-01 上证所信息网络有限公司 Block chain edge calculation system
CN114710275A (en) * 2022-03-28 2022-07-05 湖南科技大学 Block chain-based cross-domain authentication and key agreement method in Internet of things environment
CN115379581A (en) * 2022-08-17 2022-11-22 中国电力科学研究院有限公司 Method, system, equipment and storage medium for unloading edge cloud server traffic

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6825296B2 (en) * 2016-10-11 2021-02-03 富士通株式会社 Edge server and its encrypted communication control method
US11177964B2 (en) * 2019-01-25 2021-11-16 International Business Machines Corporation Blockchain based authentication

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101829721B1 (en) * 2016-11-03 2018-03-29 주식회사 코인플러그 Method for certifying a user by using mobile id through blockchain, and terminal and server using the same
CN106790259A (en) * 2017-01-25 2017-05-31 国家电网公司 A kind of asymmetric across cryptographic system re-encryption, decryption method and system
US10805085B1 (en) * 2017-08-24 2020-10-13 United Services Automobile Association (Usaa) PKI-based user authentication for web services using blockchain
CN113079159A (en) * 2021-04-01 2021-07-06 北京邮电大学 Edge computing network architecture based on block chain
CN114124956A (en) * 2021-11-17 2022-03-01 上证所信息网络有限公司 Block chain edge calculation system
CN114710275A (en) * 2022-03-28 2022-07-05 湖南科技大学 Block chain-based cross-domain authentication and key agreement method in Internet of things environment
CN115379581A (en) * 2022-08-17 2022-11-22 中国电力科学研究院有限公司 Method, system, equipment and storage medium for unloading edge cloud server traffic

Also Published As

Publication number Publication date
CN116455674A (en) 2023-07-18

Similar Documents

Publication Publication Date Title
US20230017740A1 (en) Electric Border Gateway Device and Method for Chaining and Storage of Sensing Data Based on the Same
CN110958111B (en) Block chain-based identity authentication mechanism of electric power mobile terminal
Kim et al. SeDAX: A scalable, resilient, and secure platform for smart grid communications
US20150149767A1 (en) Method and system for authenticating the nodes of a network
CN112217793B (en) Cross-system trust management system suitable for power Internet of things
CN101610452A (en) A kind of sensor network is differentiated the fusion method with key management mechanism
CN113824563B (en) Cross-domain identity authentication method based on block chain certificate
Tesei et al. IOTA-VPKI: A DLT-based and resource efficient vehicular public key infrastructure
CN113626781B (en) Block chain efficient authentication method based on trusted group
Shang et al. Publish-subscribe communication in building management systems over named data networking
Khan et al. Secure communication architecture for dynamic energy management in smart grid
CN111786785B (en) Block chain-based power distribution Internet of things node switching method and device
Cai et al. Scalable on-chain and off-chain blockchain for sharing economy in large-scale wireless networks
CN106209802A (en) A kind of electric power 4G network security certification based on group policy and cryptographic key negotiation method
CN116455674B (en) User identity information management method based on block chain
CN113315753A (en) Block data credibility recovery method based on coding technology
Rani et al. Survey on key pre distribution for security in wireless sensor networks
Long et al. A key management architecture and protocols for secure smart grid communications
Joy et al. Smart card authentication model based on elliptic curve cryptography in IoT networks
CN114172742B (en) Hierarchical authentication method for electric power Internet of things terminal equipment based on node map and edge authentication
CN112995939B (en) Wireless sensor network transmission and cloud service access control system
Kim et al. GridDataBus: Information-centric platform for scalable secure resilient phasor-data sharing
Guo et al. Blockchain-based multi-party cooperation and resource-sharing scheme for space-air-ground integrated networks
CN111526195A (en) Decentralized information storage node communication network system and method
Si et al. Node switching method in power distribution Internet of Things based on blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant