Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internet of Things equipment authentication method based on block chain

A technology of IoT devices and authentication methods, which is applied in the field of blockchain-based IoT device authentication, can solve problems such as restricted development, data control, and lack, and achieve the goals of improving fault tolerance, scalability, and security Effect

Active Publication Date: 2020-01-14
GUANGDONG POWER GRID CO LTD +1
View PDF7 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The traditional Internet of Things IOT faces many problems, such as the lack of a unified standard for a large number of access devices and the inability to integrate them into a whole
[0003] Although the combination of IOT and cloud computing has greatly promoted the development of IOT, the shortcomings of the centralization of cloud computing itself have also limited its development in many ways, such as: IOT relies too much on centralized institutions and those Companies that provide cloud computing services, which can lead to the possibility of data tampering and data control by institutions with excessive power
[0004] As another example, a blockchain-based medical data sharing model pointed out in "Research on Blockchain-Based Medical Data Sharing Model" uses merkel trees to record storage information, which can solve the problem of data sharing in individual medical institutions, but Because its medical data is homogeneous, its data needs to have a sharing mechanism, and among IoT devices, most IoT devices are heterogeneous, which lacks the authentication of data communication brought about by heterogeneous devices in IoT scenarios and data privacy issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things equipment authentication method based on block chain
  • Internet of Things equipment authentication method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the following The described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0038] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and through specific implementation methods.

[0039] The implementation mode of the present invention is illustrated by specific specific examples below, and those who are familiar with this technology can...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an Internet of Things equipment authentication method based on a block chain. The method comprises the following specific steps: establishing a hybrid model of fog computing, a cloud server and the block chain for performing data processing on heterogeneous data generated by Internet of Things equipment connected to the Internet of Things; processing heterogeneous data generated by the Internet of Things equipment through fog calculation to form authentication data; sending a data entity of the authentication data to the cloud server through fog computing for data storage, sending an index and a Hash value of the authentication data to a blockchain for uplink, then carrying out whole-network publishing on the Internet of Things, and meanwhile, enabling the Internet of Things equipment to record a public and private key pair for identifying the identity of the Internet of Things equipment on a chain of the blockchain; enabling other Internet ofThings devices connected to the Internet of Things to perform signature verification on the Internet of Things device providing the public and private key pair in the blockchain to obtain the ownership of access and use of data, thereby realizing cooperation among multiple manufacturers and interconnection and intercommunication under the condition of device information privacy protection.

Description

technical field [0001] The embodiment of the present invention relates to the technical field of the Internet of Things, in particular to a method for authenticating an Internet of Things device based on a block chain. Background technique [0002] The traditional Internet of Things (IOT) faces many problems, such as the lack of a unified standard for a large number of access devices and the inability to integrate them into a whole. [0003] Although the combination of IOT and cloud computing has greatly promoted the development of IOT, the shortcomings of the centralization of cloud computing itself have also limited its development in many ways, such as: IOT relies too much on centralized institutions and those Companies that provide cloud computing services, which will lead to the possibility of data tampering and data control by those institutions with too much power. [0004] As another example, a blockchain-based medical data sharing model pointed out in "Research on ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L67/12H04L67/1097H04L9/50
Inventor 翟柱新邹钟璐黄志才李为黄贺平朱辉青瞿振袁志坚陈皓宁全源温思行袁咏诗陈寿瑜邓建中冯奕军陈小群徐浩
Owner GUANGDONG POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products