Intelligent Internet of Things equipment authentication method and system based on blockchain
A technology for Internet of Things devices and Internet-connected devices, applied in the field of Internet of Things, can solve the problems of human password and certificate storage costs, low degree of automation of the authentication process, difficult certificate management, etc., to achieve strong security, time saving, and computational complexity. reduced effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0069] This embodiment provides a block chain-based intelligent IoT device authentication method, which can be implemented by an electronic device, and the electronic device can be a terminal or a server. The model principle of the blockchain-based intelligent IoT device authentication method is as follows: figure 1 As shown, specifically, the execution flow of the blockchain-based smart IoT device authentication method includes the following steps:
[0070] The IoT device generates its own identity based on the preset physical unclonable function, and uses its own identity as the public key of the searchable encryption algorithm to generate the preset ciphertext through the searchable encryption algorithm;
[0071] The registration center is based on the smart contract of the blockchain and the distributed ledger database, combined with the identity and ciphertext of the IoT device, generates the private key of the searchable encryption algorithm corresponding to the IoT devi...
no. 2 example
[0103] This embodiment provides a smart IoT device authentication system based on blockchain, the smart IoT device authentication system includes IoT devices, a registration center, and an authentication center; wherein,
[0104] The IoT device is used to generate its own identity based on a preset physical unclonable function, and uses its own identity as a public key of a searchable encryption algorithm to generate a preset ciphertext through a searchable encryption algorithm, and Send its own identity and ciphertext to the registration center;
[0105] The registration center is used for blockchain-based smart contracts and distributed ledger databases, combined with the identity and ciphertext of IoT devices to generate private keys corresponding to searchable encryption algorithms for IoT devices, and assigning group keys to IoT devices. The name and the public-private key pair of the ring signature algorithm, and complete the registration of the IoT device;
[0106] The...
no. 3 example
[0109] This embodiment provides an electronic device, which includes a processor and a memory; at least one instruction is stored in the memory, and the instruction is loaded and executed by the processor, so as to implement the method of the first embodiment.
[0110] The electronic device may have relatively large differences due to different configurations or performances, and may include one or more processors (central processing units, CPU) and one or more memories, wherein at least one instruction is stored in the memory, so The above instruction is loaded by the processor and executes the above method.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com