Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Device networking authentication method based on blockchain

A technology of blockchain and equipment, applied in the field of computer networks, can solve the problems of authentication system damage, system paralysis, and the inability of both communication parties to know that information has been tampered with.

Active Publication Date: 2018-11-16
NAT UNIV OF DEFENSE TECH
View PDF5 Cites 104 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] (2) Non-tamperable and encrypted security. The system adopts a one-way hash algorithm, and the newly generated blocks are advanced in strict time-linear order. For trying to rewrite or modify transaction records, its cost is very high
[0020] (1) If any problem occurs during the communication process, when the CA cannot make corresponding countermeasures, the two parties in the communication will not be able to solve the problem, resulting in the final problem being ignored;
[0021] (2) Once the CA is attacked, the entire authentication system will be greatly damaged, and in severe cases, the entire system will be paralyzed;
[0022] (3) If the attacker tampers with the information during the communication process, the two parties in the communication cannot know that the information has been tampered with
[0027] Through consulting the data, it is found that there is currently no public literature related to the method of using blockchain for device network authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device networking authentication method based on blockchain
  • Device networking authentication method based on blockchain
  • Device networking authentication method based on blockchain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0132] figure 1 It is the blockchain network structure diagram constructed in the first step of the present invention. Such as figure 1 As shown, the blockchain network includes multiple clients, multiple submission nodes and multiple consensus nodes, the submission nodes are connected to each other, and the consensus nodes are connected to each other. Among them, the lines without arrows indicate that the nodes are connected through the network, and the lines with arrows indicate the input and output of information. The client is connected to the endorsement node and the consensus node. The client initiates a transaction proposal to the endorsement node, receives and verifies the endorsement result returned by the endorsement node, and sends the transaction proposal and the verified endorsement result to the consensus node. The consensus node is connected to the client and the submission node. The consensus node generates a block based on the transaction proposal sent by ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a device networking authentication method based on a blockchain for solving the single point failure problem existing in the current networking authentication method. The technical scheme is to deploy a blockchain network comprising a client, a submission node and a consensus node. By means of the non-tampering property of the blockchain, a device firstly registers on the blockchain before accessing the network, when the device A needs to access the network, the device sends a networking request of a device B that has accessed to the network, the device B compares the information of the device A in the networking request with the information of the device A stored in the blockchain to judge whether the identity of the device A is legal, a smart contract issues a token to the device A, a timestamp in the token ensures that the device A is valid within a certain period of time, and after the token expires, the device A needs to pass the identity authentication toaccess the network again. By adoption of the device networking authentication method disclosed by the invention, the single point failure problem existing in the traditional networking authenticationmethod can be avoided, the legality of the identity of the device is ensured, and the security of the network is improved.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to a block chain-based equipment networking authentication method. Background technique [0002] The blockchain was originally a special distributed accounting technology designed by a person named Satoshi Nakamoto for Bitcoin (a digital currency). Bitcoin and the blockchain technology derived from it have introduced technologies such as signature system, consensus mechanism, and time stamps. The mutual cooperation between various modules perfectly solves the security risks caused by decentralization. Therefore, blockchain is not a brand-new Internet technology, but a clever integration of many existing technologies, such as asymmetric key signature, consensus mechanism, time stamp, hash algorithm, P2P communication, etc. Blockchain technology is based on a decentralized peer-to-peer network, combining cryptography principles, time series data and consensus mechanisms to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08H04L9/32
CPCH04L9/0643H04L9/0861H04L9/0866H04L9/0869H04L9/0894H04L9/3213H04L9/3247H04L9/3297
Inventor 邓文平王宝生黄金李东星彭伟盖方宇郦苏丹陈红艳
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products