Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A blockchain-based smart IoT device authentication method and system

A technology of IoT devices and networking devices, applied in the field of IoT, can solve the problems of manpower password and certificate storage costs, low degree of automation of the authentication process, difficulty in certificate management, etc., to achieve strong security, save time, and reduce the amount of calculation Reduced effect

Active Publication Date: 2022-07-22
UNIV OF SCI & TECH BEIJING
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] 1. In the authentication, there are human password and certificate storage costs and the possibility of human error, and the efficiency is low, and the degree of automation of the authentication process is not high
[0010] 2. Traditional encryption methods have difficulties in certificate management and excessive resource consumption in data encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A blockchain-based smart IoT device authentication method and system
  • A blockchain-based smart IoT device authentication method and system
  • A blockchain-based smart IoT device authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0069] This embodiment provides a blockchain-based smart IoT device authentication method, which can be implemented by an electronic device, and the electronic device can be a terminal or a server. The model principle of this blockchain-based smart IoT device authentication method is as follows: figure 1 Specifically, the execution flow of the blockchain-based smart IoT device authentication method includes the following steps:

[0070] The IoT device generates its own identity based on the preset physical unclonable function, and uses its own identity as the public key of the searchable encryption algorithm, and generates the ciphertext through the searchable encryption algorithm;

[0071] The registry is based on blockchain-based smart contracts and distributed ledger databases, combined with the identity and ciphertext of the IoT devices, generates the private key of the searchable encryption algorithm corresponding to the IoT devices, and assigns group names and rings to t...

no. 2 example

[0103] This embodiment provides a blockchain-based authentication system for smart IoT devices, where the smart IoT device authentication system includes IoT devices, a registration center, and an authentication center; wherein,

[0104] The Internet of Things device is used to generate its own identity based on a preset physical unclonable function, and uses its own identity as the public key of the searchable encryption algorithm, generates ciphertext through the searchable encryption algorithm, and uses its own identity as the public key of the searchable encryption algorithm. The identification and ciphertext are sent to the said registration center;

[0105] The registration center is used for blockchain-based smart contracts and distributed ledger databases, and generates the private key of the searchable encryption algorithm corresponding to the IoT device in combination with the ID and ciphertext of the IoT device, and assigns a group to the IoT device. Name and public...

no. 3 example

[0109] This embodiment provides an electronic device, which includes a processor and a memory; wherein, at least one instruction is stored in the memory, and the instruction is loaded and executed by the processor to implement the method of the first embodiment.

[0110] The electronic device may vary greatly due to different configurations or performances, and may include one or more processors (central processing units, CPU) and one or more memories, wherein the memory stores at least one instruction, so The instructions are loaded by the processor and execute the above method.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a blockchain-based intelligent IoT device authentication method and system. The method includes: the device generates its own identity mark based on a physical unclonable function, and uses the own identity mark as a public key of a searchable encryption algorithm , generate the ciphertext; the registration center generates the private key of the searchable encryption algorithm corresponding to the device based on the smart contract and the distributed ledger database, and assigns the group name and the public-private key pair of the ring signature algorithm to the device to complete the registration of the device; the certification center Using smart contracts, searchable encryption is performed based on the identity of the device to realize the personal login authentication of the device; and the group login authentication of the device is realized based on the ring signature algorithm. The invention can realize effective combined authentication for intelligent Internet of things equipment, automatic execution of intelligent contracts, reduce the problem of excessive resource consumption, and the new cryptographic algorithm has higher calculation efficiency and can ensure the security of the system.

Description

technical field [0001] The invention relates to the field of Internet of Things, in particular to a method and system for authentication of intelligent Internet of Things devices based on blockchain. Background technique [0002] At present, there are three common schemes for IoT identity authentication: [0003] 1) Identity authentication scheme based on public key infrastructure (PKI, public key infrastructure), in this scheme, the certificate authority assigns a digital certificate to each device, and the digital certificate contains the public key of the device and the digital certificate of the certificate authority. sign. The device uses its own private key to generate a message signature, and the public key is used by the receiver to verify the signature. This scheme will not reveal the true identity of the device during the verification process. [0004] 2) Identity-based signature (IBS, identity-based signature) scheme, this scheme realizes the distribution of dev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/40G06Q20/38H04L9/08
CPCH04L9/3278H04L9/0866H04L9/3226H04L63/0876G06Q20/3829H04L2209/72H04L2209/56
Inventor 陈红松张艺潆
Owner UNIV OF SCI & TECH BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products