SG10202010664UA - Multi-node authentication method and apparatus based on block chain - Google Patents
Multi-node authentication method and apparatus based on block chainInfo
- Publication number
- SG10202010664UA SG10202010664UA SG10202010664UA SG10202010664UA SG10202010664UA SG 10202010664U A SG10202010664U A SG 10202010664UA SG 10202010664U A SG10202010664U A SG 10202010664UA SG 10202010664U A SG10202010664U A SG 10202010664UA SG 10202010664U A SG10202010664U A SG 10202010664UA
- Authority
- SG
- Singapore
- Prior art keywords
- block chain
- authentication method
- apparatus based
- node authentication
- node
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0884—Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3215—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a plurality of channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/082—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Power Engineering (AREA)
- General Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Information Transfer Between Computers (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020200006473A KR102094705B1 (ko) | 2020-01-17 | 2020-01-17 | 블록 체인을 기반으로 한 다중 노드 인증 방법 및 이를 위한 장치 |
Publications (1)
Publication Number | Publication Date |
---|---|
SG10202010664UA true SG10202010664UA (en) | 2021-08-30 |
Family
ID=70003392
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG10202010664UA SG10202010664UA (en) | 2020-01-17 | 2020-10-27 | Multi-node authentication method and apparatus based on block chain |
Country Status (9)
Country | Link |
---|---|
US (2) | US10904252B1 (zh) |
JP (1) | JP6902151B1 (zh) |
KR (1) | KR102094705B1 (zh) |
CN (1) | CN113141340B (zh) |
GB (2) | GB2607701A (zh) |
MY (1) | MY189676A (zh) |
SG (1) | SG10202010664UA (zh) |
TW (1) | TWI746229B (zh) |
WO (1) | WO2021145555A1 (zh) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102094705B1 (ko) * | 2020-01-17 | 2020-03-30 | 주식회사 에프엔에스벨류 | 블록 체인을 기반으로 한 다중 노드 인증 방법 및 이를 위한 장치 |
CN112953704B (zh) * | 2021-01-29 | 2022-05-27 | 杭州叙简科技股份有限公司 | 一种基于5g的无人poc中继方法 |
GB2621504A (en) * | 2021-11-03 | 2024-02-14 | Dabco Ltd | Authenticating a device |
GB2612769B (en) * | 2021-11-03 | 2023-12-27 | Dabco Ltd | Authenticating a device |
Family Cites Families (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6601171B1 (en) * | 1999-02-18 | 2003-07-29 | Novell, Inc. | Deputization in a distributed computing system |
US6240188B1 (en) * | 1999-07-06 | 2001-05-29 | Matsushita Electric Industrial Co., Ltd. | Distributed group key management scheme for secure many-to-many communication |
EP1584035B1 (en) * | 2002-12-31 | 2015-04-15 | International Business Machines Corporation | Authorized anonymous authentication |
US20040243828A1 (en) * | 2003-05-30 | 2004-12-02 | Aguilera Marcos K. | Method and system for securing block-based storage with capability data |
US8245050B1 (en) * | 2006-09-29 | 2012-08-14 | Netapp, Inc. | System and method for initial key establishment using a split knowledge protocol |
JP5188189B2 (ja) * | 2008-01-18 | 2013-04-24 | 富士通株式会社 | 認証システム、認証装置及びコンピュータプログラム |
KR101714108B1 (ko) * | 2009-12-04 | 2017-03-08 | 크라이프토그라피 리서치, 인코포레이티드 | 검증가능 누출 방지 암호화 및 복호화 |
JP6072806B2 (ja) * | 2011-09-27 | 2017-02-01 | コーニンクレッカ フィリップス エヌ ヴェKoninklijke Philips N.V. | グループメンバによるグループ秘密の管理 |
US9572029B2 (en) * | 2012-04-10 | 2017-02-14 | Imprivata, Inc. | Quorum-based secure authentication |
US9853819B2 (en) * | 2013-08-05 | 2017-12-26 | Guardtime Ip Holdings Ltd. | Blockchain-supported, node ID-augmented digital record signature method |
GB2513260B (en) * | 2014-06-27 | 2018-06-13 | PQ Solutions Ltd | System and method for quorum-based data recovery |
US9918225B2 (en) * | 2014-11-03 | 2018-03-13 | Qualcomm Incorporated | Apparatuses and methods for wireless communication |
US9847978B2 (en) * | 2015-09-09 | 2017-12-19 | Fast Dog, LLC | Secure mobile affirmative consent management |
US9660970B1 (en) * | 2015-12-03 | 2017-05-23 | Amazon Technologies, Inc. | Cryptographic key distribution |
US20170243225A1 (en) * | 2016-02-24 | 2017-08-24 | Mastercard International Incorporated | Systems and methods for using multi-party computation for biometric authentication |
US9985964B2 (en) * | 2016-03-28 | 2018-05-29 | Black Gold Coin, Inc. | Systems and methods for providing block chain-based multifactor personal identity verification |
KR101816650B1 (ko) | 2017-02-21 | 2018-01-09 | 주식회사 코인플러그 | 계정 등록의 간소화 서비스 및 사용자 인증 서비스를 제공하는 방법 및 이를 이용한 인증 서버 |
CN106789047B (zh) * | 2017-03-03 | 2019-09-10 | 上海唯链信息科技有限公司 | 一种区块链身份系统 |
CN107196900B (zh) | 2017-03-24 | 2020-04-24 | 创新先进技术有限公司 | 一种共识校验的方法及装置 |
KR20180129475A (ko) | 2017-05-26 | 2018-12-05 | 삼성에스디에스 주식회사 | 인증을 수행하기 위한 방법, 사용자 단말 및 인증 서비스 서버 |
US10735193B1 (en) * | 2017-06-01 | 2020-08-04 | Massachusetts Mutual Life Insurance Company | Decentralized encryption and decryption of blockchain data |
GB201710176D0 (en) * | 2017-06-26 | 2017-08-09 | Nchain Holdings Ltd | Computer-implemented system and method |
US20190044917A1 (en) * | 2017-08-04 | 2019-02-07 | Bank Of America Corporation | System for secure verification of identity data |
EP3442160A1 (en) * | 2017-08-07 | 2019-02-13 | Siemens Aktiengesellschaft | Pruning of authentication trees |
KR102041341B1 (ko) | 2017-09-14 | 2019-11-27 | 숭실대학교산학협력단 | 블록체인을 이용한 사물인터넷 보안 시스템 및 보안 방법 |
JP6939313B2 (ja) * | 2017-09-21 | 2021-09-22 | 富士フイルムビジネスイノベーション株式会社 | 分散認証システム |
US20190280863A1 (en) * | 2018-03-06 | 2019-09-12 | BizOne Ltd. | Recovery of secret data in a distributed system |
US10135835B1 (en) * | 2018-03-19 | 2018-11-20 | Cyberark Software Ltd. | Passwordless and decentralized identity verification |
KR102135856B1 (ko) * | 2018-06-29 | 2020-07-20 | 세종대학교산학협력단 | 퍼블릭 블록체인의 노드 인증 방법과 이를 수행하기 위한 장치 및 시스템 |
KR101929482B1 (ko) | 2018-08-13 | 2019-03-12 | (주)아사달 | 상호인증 블록체인 기반의 기업정보 공유 방법 |
KR101984254B1 (ko) * | 2018-09-21 | 2019-05-30 | 김성완 | 블록체인 네트워크를 구성하는 노드 장치 및 그 노드 장치의 동작 방법 |
EP3654578B1 (en) * | 2018-11-16 | 2022-04-06 | SafeTech BV | Methods and systems for cryptographic private key management for secure multiparty storage and transfer of information |
US11405198B2 (en) * | 2019-02-13 | 2022-08-02 | TEEware Co., Ltd. | System and method for storing and managing keys for signing transactions using key of cluster managed in trusted execution environment |
US11764950B2 (en) * | 2019-05-22 | 2023-09-19 | Salesforce, Inc. | System or method to implement right to be forgotten on metadata driven blockchain using shared secrets and consensus on read |
KR102047260B1 (ko) | 2019-07-30 | 2019-11-21 | 주식회사 바스랩 | 블록체인 기반 사용자 통합계정 생성, 발급 및 관리방법 |
KR102094705B1 (ko) | 2020-01-17 | 2020-03-30 | 주식회사 에프엔에스벨류 | 블록 체인을 기반으로 한 다중 노드 인증 방법 및 이를 위한 장치 |
-
2020
- 2020-01-17 KR KR1020200006473A patent/KR102094705B1/ko active IP Right Grant
- 2020-06-24 CN CN202010588095.9A patent/CN113141340B/zh active Active
- 2020-06-24 US US16/911,262 patent/US10904252B1/en active Active
- 2020-07-03 MY MYPI2020003469A patent/MY189676A/en unknown
- 2020-10-20 GB GB2205613.9A patent/GB2607701A/en active Pending
- 2020-10-20 GB GB2016658.3A patent/GB2591164B/en active Active
- 2020-10-27 TW TW109137284A patent/TWI746229B/zh active
- 2020-10-27 SG SG10202010664UA patent/SG10202010664UA/en unknown
- 2020-10-28 US US17/082,150 patent/US11075909B1/en active Active
- 2020-11-19 JP JP2020192394A patent/JP6902151B1/ja active Active
- 2020-11-26 WO PCT/KR2020/016952 patent/WO2021145555A1/ko active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2021145555A1 (ko) | 2021-07-22 |
GB202205613D0 (en) | 2022-06-01 |
CN113141340B (zh) | 2022-10-14 |
US20210226949A1 (en) | 2021-07-22 |
TWI746229B (zh) | 2021-11-11 |
GB2591164B (en) | 2022-05-25 |
US11075909B1 (en) | 2021-07-27 |
JP6902151B1 (ja) | 2021-07-14 |
TW202130158A (zh) | 2021-08-01 |
JP2021114280A (ja) | 2021-08-05 |
GB2591164A (en) | 2021-07-21 |
CN113141340A (zh) | 2021-07-20 |
GB202016658D0 (en) | 2020-12-02 |
KR102094705B1 (ko) | 2020-03-30 |
US10904252B1 (en) | 2021-01-26 |
MY189676A (en) | 2022-02-24 |
GB2607701A (en) | 2022-12-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2591164B (en) | Multi-node authentication method and apparatus based on block chain | |
EP3812992A4 (en) | BLOCK CHAIN TRANSACTION PROCESS AND APPARATUS | |
ZA202005744B (en) | Method and system for encrypted communication between devices by using block chain system | |
EP4177772A4 (en) | BLOCKCHAIN-BASED GREEN ENERGY AUTHENTICATION METHOD, APPARATUS AND SYSTEM | |
EP4205351A4 (en) | AUTHENTICATION METHOD AND SYSTEM | |
GB2598016B (en) | Biometric authentication apparatus and biometric authentication method | |
SG11202112749TA (en) | Security context obtaining method and apparatus, and communications system | |
EP4033440A4 (en) | CONSENSUS METHOD, DEVICE AND APPARATUS OF A BLOCKCHAIN | |
GB202015541D0 (en) | Authentication system and method | |
SG10202013180XA (en) | Scarf repair apparatus, system, and method | |
EP4243468A4 (en) | AUTHENTICATION METHOD AND ASSOCIATED DEVICE | |
EP4171072A4 (en) | TRUSTED COMMUNICATION METHOD AND ASSOCIATED DEVICE | |
EP4250663A4 (en) | COMMUNICATION METHOD AND DEVICE AND COMMUNICATION DEVICE | |
EP4209946A4 (en) | CROSS-DEVICE AUTHENTICATION METHOD AND RELATED APPARATUS | |
EP3951611A4 (en) | BLOCK VERIFICATION METHOD, APPARATUS AND DEVICE | |
EP4293554A4 (en) | AUTHENTICATION DEVICE AND AUTHENTICATION METHOD | |
EP4203550A4 (en) | RESOURCE DETERMINATION METHOD, APPARATUS AND SYSTEM | |
EP4280736A4 (en) | METHOD AND APPARATUS FOR CONFIGURING RESOURCES, AND METHOD AND APPARATUS FOR DETERMINING RESOURCES | |
EP4245046A4 (en) | AUTHENTICATION METHOD AND DEVICE AND RELATED PRODUCTS | |
GB202009095D0 (en) | Apparatus, method and use | |
SG10202002095PA (en) | Big data processing system and processing method based on block chain | |
GB201916459D0 (en) | Security apparatus, system and method | |
EP4250173A4 (en) | AUTHENTICATION SYSTEM, DEVICE AND METHOD | |
EP4277283A4 (en) | METHOD, APPARATUS AND SYSTEM FOR LIVE BROADCASTING | |
EP4280707A4 (en) | TRANSMISSION CONFIGURATION METHOD AND APPARATUS AND RELATED DEVICE |