A trusted verification method based on dnssec and dane protocol

A verification method and a credible technology, applied in the network field, can solve problems such as forged product label barcodes and counterfeit label deception, and achieve the effect of preventing abuse

Active Publication Date: 2017-04-12
CHINA INTERNET NETWORK INFORMATION CENTER
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, for the problem that the barcode of the product label may be forged, add the corresponding verification server, or add the encryption card with counting function to record the history of the product label being queried, so as to solve the problem of criminals using forged labels to deceive repeatedly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A trusted verification method based on dnssec and dane protocol
  • A trusted verification method based on dnssec and dane protocol
  • A trusted verification method based on dnssec and dane protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The following three specific examples are used to illustrate the content of the invention. Let's first introduce an example of dealer anti-counterfeiting. The anti-counterfeiting process is as follows: Figure 4 As shown, it can be divided into two stages: registration and query. In the registration stage, the dealer generates a pair of public and private keys, and submits the public key and the dealer's registration number to the national authority (here, it is assumed to be "National Internet of Things Identification Management Public Service Platform", the same below), The online identity management public service platform creates a TLSA resource record for the dealer, which contains the dealer's public key information. In the inquiry stage, the dealer anti-counterfeiting APP first scans the dealer logo, and converts the obtained dealer logo (here 5936) into a domain name (here 5936.gsh.niot.cn), and then reports to the National Internet of Things Logo Management T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a credible verification method based on DNSSEC and DANE protocols. This method is as follows: 1) Generate a group of key pairs for each object to be verified, submit the public key to an authoritative server, and store the private key on the set encryption card and cannot be copied; 2) The authoritative server is in its DNS domain assign a sub-domain name to the verification object, and add a DANE resource record storing its public key to the verification object, and use the public key to sign; After the domain name, a query request is initiated to the DNS domain of the authoritative server; 4) The authoritative server returns the corresponding DANE resource record; 5) The user obtains the identity of the verification object and sends it to the encryption card for encryption; 6) The trusted verification client The terminal uses the public key in the returned resource record to decrypt the ciphertext and verify the verification object. The invention greatly improves the anti-counterfeiting capability.

Description

technical field [0001] The invention relates to a trusted verification method based on DNSSEC and DANE protocols in the Internet of Things, and belongs to the technical field of networks. Background technique [0002] An important application of the Internet of Things is the traceability and anti-counterfeiting of commodities. The current common practice in the industry is to assign a unique label code (such as an RFID tag) to each commodity to realize the binding of commodities and labels; Relevant information is associated with the tag, so as to achieve the purpose of querying commodity-related information through the tag. [0003] Although these means in the prior art can play the role of commodity anti-counterfeiting to a certain extent, there are still some technical loopholes. First of all, although a mechanism is provided to locate the corresponding official website based on the label on the product and then query the relevant information of the product, the official...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L9/40
Inventor 孔宁邓光青沈烁刘冰黄向阳
Owner CHINA INTERNET NETWORK INFORMATION CENTER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products