CN111371543A - Internet of things equipment access control method based on double-block chain structure - Google Patents
Internet of things equipment access control method based on double-block chain structure Download PDFInfo
- Publication number
- CN111371543A CN111371543A CN202010046368.7A CN202010046368A CN111371543A CN 111371543 A CN111371543 A CN 111371543A CN 202010046368 A CN202010046368 A CN 202010046368A CN 111371543 A CN111371543 A CN 111371543A
- Authority
- CN
- China
- Prior art keywords
- module
- block chain
- internet
- local
- task
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/006—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention relates to an access control method of Internet of things equipment based on a double-block chain structure, which is realized by an access control system of the Internet of things equipment based on the double-block chain structure and comprises the following steps of ①, system initialization, ②, when a user sends a task request to a business service module, the business service module broadcasts a state information query request to a consensus block chain module, ③, the consensus block chain module verifies the task request and forwards the task request to a local block chain module, ④, the local block chain module verifies the identity of the user through a PKI module and guides the Internet of things equipment to make a corresponding response, ⑤, the Internet of things equipment sends task response data to the local block chain module, and ⑥, the local block chain module feeds back the task response data to the user through the consensus block chain module and the business service module.
Description
Technical Field
The invention relates to an access control method for equipment of the Internet of things based on a double-block chain structure, and belongs to the field of block chains and the Internet of things.
Background
With the official business of domestic 5G, trades such as edge computing have been driven and have risen again, and the thing that especially 5G environment advocated links to each other's novel revolutionary technical cooperation mode of thing networking for the thing networking technology receives great attention. However, under the background that the internet of things technology is gradually deepened and increased in scale in various application scenes, the organization mode of the traditional system also highlights the inevitable defects. For example, in a traditional centralized service mode, the expansibility at the later stage is reduced, the system risk caused by single-point failure is increased, and the DDoS attack resistance is weak; and the natural lack of the system in the aspect of information security, so that the system has to rely on other technologies to avoid the information security problem in the aspect of information transmission; in addition, fine-grained authority control cannot be achieved for users, servers and a large number of heterogeneous devices participating in information transfer and acquisition of the whole system.
By using cryptography as a bottom layer supporting technology, the block chain is constructed in a distributed, multi-center and trustable bottom layer information environment with data not being tampered, so that the block chain has natural advantages when being applied to a distributed scene. The system is more robust due to multi-center nodularization; based on the digital certificate authority management foundation and the PKI system foundation, the method provides possibility for realizing fine-grained authority management of the whole system and realizing safe information exchange between nodes without depending on other systems.
The method aims at the limitation of the development of the internet of things technology and the good technical potential provided by the block chain technology. How to solve the above problems by using the blockchain technology, to implement effective management of the permissions in the system of internet of things, to implement good expansibility and system information throughput performance of the whole system, and to enable the system to ensure the security of information on the bottom layer is a technical problem to be urgently solved by those skilled in the art.
Disclosure of Invention
In view of this, the present invention provides an access control method for an internet of things device based on a dual block chain structure, so as to achieve effective management of rights of the internet of things device and give consideration to the characteristics of expandability and high performance of the entire system architecture in an environment where data provided based on a block chain cannot be tampered.
In order to achieve the purpose, the invention provides the following technical scheme:
the method is realized by an Internet of things equipment access control system based on a double-block chain structure, and the system comprises a consensus block chain module, a local block chain module, a PKI module, a business service module and Internet of things equipment, wherein the consensus block chain module is respectively connected with the local block chain module, the PKI module and the business service module, the business service module is connected with the PKI module, the local block chain module is connected with the PKI module, and the Internet of things equipment is connected with the local block chain module; the method comprises the following steps:
④, the local block chain module verifies the identity of the user through the PKI module, verifies the authority of the user after the identity is verified, and guides the Internet of things equipment to make corresponding response after the authority is verified;
Furthermore, the business service module is composed of a server with a communication module and a common identification block chain light node.
When a user initiates a task request to a business service module, the business service module initiates an identity verification request to a PKI module, after the verification is passed, the business service module encrypts the task request by using a public key of a local area block chain module, signs by using a private key of the business service module, packs the task request into a task request of the business service module according to a rule, and broadcasts the task request of the business service module to a common identification block chain node server.
And when the business service module monitors the task response data belonging to the business service module from the consensus block chain module, the private key of the business service module is used for decrypting the task response data, and then the task response data is decoded according to the rule and fed back to the user.
Furthermore, the consensus blockchain module is formed by networking three or more servers with communication modules and a consensus blockchain algorithm as consensus nodes, and the consensus blockchain comprises legal configuration items; the consensus block chain algorithm can determine different consensus algorithms according to different application scenes, and common consensus protocol algorithms such as PBFT or RAFT are selected.
When any server in the common identification block chain module receives a task request of a business service module through a self-contained communication module, the common identification block chain module firstly initiates an identity verification request to a PKI module, after the verification is passed, the common identification block chain module verifies the legality of the task request through comparing common identification block chain configuration items, the server packs the task request into blocks, then the common identification block chain algorithm is adopted to enable the information states among other node servers of the common identification block chain module to be consistent and chain the blocks, finally all servers retrieve the task request in the blocks, determine the server matched with the task request, and send the task request to a local area block chain module connected with the server.
When any server in the consensus blockchain module receives task response data of the local blockchain module through the self-contained communication module, the server packs the task response data into blocks after verifying the legality of the task response data through comparing the consensus blockchain configuration items, and then adopts a consensus blockchain algorithm to enable the information states among other node servers of the consensus blockchain module to be consistent and link the blocks.
Further, the local area block chain module is a server with a communication module and a local area block chain; the local area block chain comprises permission configuration items of the Internet of things equipment, and the permission configuration items are authorized configurations of all the Internet of things equipment connected with the local area block chain module.
When the local area blockchain module receives a task request of the consensus blockchain module through the communication module, the local area blockchain module initiates an identity verification request to the PKI module, after the identity verification is passed, the task request is verified and signed through a public key of the service module, then the local area blockchain module decrypts the task request by adopting a private key of the local area blockchain module, and finally the local area blockchain module verifies the access and control authority of the managed Internet of things device according to the authority configuration item and initiates the task request to the Internet of things device after the verification is passed.
When the local area block chain module receives the task response data uploaded by the Internet of things equipment through the communication module, the local area block chain module packs the task response data and links the task response data to the server of the local area block chain module, and then the task response data are sent to the common identification block chain module through the communication module.
Further, the PKI module is a public key infrastructure consisting of a communication module, a server, an encryption machine and a cipher machine and is responsible for issuing, verifying and canceling a public and private key pair. In particular, the PKI server can directly access the consensus blockchain module, or can be a distributed server as a PKI server in the communication cluster.
Further, the internet of things equipment comprises an intelligent thermometer with a communication module, various environment sensors and various edge computing equipment; when a communication module of the Internet of things equipment receives a task request of the local block chain module, the Internet of things equipment makes a corresponding response, and sends the task response data to the local block chain module after being encrypted by a public key.
The invention has the beneficial effects that: the invention provides an access control method of Internet of things equipment based on a double-block chain structure, which utilizes a double-block chain architecture mode to divide a consensus processing flow of a task request communicated in an access control system and a response processing flow of the Internet of things equipment, improves the processing capacity of the access control system to the task request, is beneficial to the management of the validity of the authority of the Internet of things equipment, is beneficial to the realization of the non-falsification of data information, and is beneficial to the multi-center service and the de-center trust of the access control system.
Drawings
For the purpose and technical solution of the present invention, the present invention is illustrated by the following drawings:
fig. 1 is a flow architecture diagram of an access control method for an internet of things device based on a dual-block chain structure according to the present invention; wherein: the solid line is the structural connection relation, and the dotted line is the off-line initialization setting;
fig. 2 is a block diagram of a method for controlling access to an intelligent thermometer based on a dual-block chain structure according to an embodiment of the present invention.
Detailed Description
In order to make the technical solution, the purpose of the embodiments, and the advantages of the system architecture of the present invention more apparent, a preferred embodiment of the present invention will be described in detail below with reference to fig. 2.
In order to solve the problem of obtaining real-time status values of a plurality of intelligent thermometers installed in different areas, the present embodiment provides an intelligent thermometer communication access control method based on a dual-block chain structure in combination with the method of the present invention, where the method is implemented by an intelligent thermometer communication access control system based on a dual-block chain structure, and the system includes a consensus block chain module 4, a local block chain module 5, a PKI module 3, a service module 2, and an intelligent thermometer 6, where the consensus block chain module 4 is respectively connected to the local block chain module 5, the PKI module 3, and the service module 2, the service module 2 is connected to the PKI module 3, the local block chain module 5 is connected to the PKI module 3, and the intelligent thermometer 6 is connected to the local block chain module 5. The method of the embodiment comprises the following steps:
④, the local area block chain module 5 verifies the identity of the user 1 through the PKI module 3, when the identity verification is passed, the local area block chain module 5 verifies the authority of the user 1, and when the authority verification is passed, the local area block chain module 5 sends a real-time temperature value uploading instruction to the intelligent thermometer 6;
Further, the service module 2 is composed of a server with a communication module and a common block chain light node.
Further, the PKI module 3 is a public key infrastructure composed of a communication module, a server, an encryption engine and a cryptographic engine, and includes, but is not limited to, a digital certificate (public key) issuing service, a digital certificate revoking service, a key management service, and the like.
Furthermore, the consensus blockchain module 4 is formed by networking three or more servers with communication modules and a consensus blockchain algorithm as consensus nodes, wherein the consensus blockchain comprises legal configuration items; the application scene of the consensus block chain server node comprises a Byzantine node, and a PBFT consensus protocol algorithm is selected as the consensus block chain algorithm.
Further, the local area block chain module 5 is a server with a communication module and a local area block chain 7; the local blockchain 7 contains the authority configuration items of the intelligent thermometers 6, and the authority configuration items are authorized configurations of all the intelligent thermometers 6 connected with the local blockchain module 5.
Specifically, step ② is:
the user 1 initiates a task request to the service module 2, the task request needs to include a digital certificate of the target intelligent thermometer 6, a digital certificate of a local area block chain node to which the intelligent thermometer 6 belongs, a digital certificate of the initiating main user 1, task request content and the like, and the task request can be expanded according to different service scenes.
The business service module 2 initiates an identity verification request to the PKI module 3, after the verification is passed, the business service module 2 encrypts the task request by using a public key of the local area block chain module 5, signs by using a private key of the business service module 2, packs the task request into the task request of the business service module 2 according to rules, and broadcasts the task request of the business service module 2 to the consensus block chain node server 4.
when any server in the consensus block chain module 4 receives a task request of the service module 2 through the self-contained communication module, the consensus block chain module 4 firstly initiates an identity verification request to the PKI module 3; after the verification is passed, the common identification block chain module 4 verifies the validity of the task request by comparing common identification block chain configuration items, the server packs the task response data into blocks, and then adopts a common identification block chain algorithm to enable the information states among other node servers of the common identification block chain module 4 to be consistent and chain the blocks; and finally, all the servers retrieve the task requests in the blocks, determine the node servers matched with the task requests, and send the task requests to the local block chain module 5 in the server communication cluster.
when the local area block chain module 5 receives the task request of the consensus block chain module through the communication module, the data packet of the task request is disassembled, and the digital certificate of the target intelligent thermometer 6, the digital certificate of the local area block chain node to which the intelligent thermometer 6 belongs, the digital certificate of the initiating main user 1, the task request content and the like are extracted. After extraction is finished, the local area block chain module 5 initiates an identity verification request to the PKI module 3, after identity verification is passed, firstly, a public key of the service module 3 is used for checking and signing the task request, then the local area block chain module 5 decrypts the task request by adopting a private key of the local area block chain module, finally, the local area block chain module 5 verifies the access and control authority of the managed intelligent thermometer 6 according to the authority configuration item, and initiates the task request to the intelligent thermometer 6 after verification is passed.
when the communication module of the intelligent thermometer 6 receives the task request of the local block chain module 5, the intelligent thermometer 6 makes a corresponding response, collects a real-time temperature value, encrypts the task response data of the real-time temperature value through a public key, and sends the encrypted task response data to the local block chain module 5.
when the local block chain module 5 receives the task response data uploaded by the intelligent thermometer 6 through the communication module, the local block chain module 5 packs the task response data and uploads the task response data to the server of the local block chain module 5, and then sends the task response data to the consensus block chain module 4 through the communication module. When the consensus blockchain module 4 monitors the task response data, the server packages the task response data into blocks after verifying the legality of the task response data by comparing the consensus blockchain configuration items, and then adopts a consensus blockchain algorithm to enable the information states among other node servers of the consensus blockchain module to be consistent and link the blocks. When the business service module 2 monitors the task response data belonging to the business service module from the consensus blockchain module 4, the private key of the business service module 2 is used for decrypting the task response data, then decoding is carried out according to rules, and the decoded task response data are fed back to the user 1.
Finally, it is noted that the above-mentioned preferred embodiments illustrate rather than limit the invention, and that, although the invention has been described in detail with reference to the above-mentioned preferred embodiments, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the scope of the invention as defined by the appended claims.
Claims (6)
1. The method is characterized by being realized by an Internet of things equipment access control system based on a double-block chain structure, wherein the system comprises a consensus block chain module, a local block chain module, a PKI module, a business service module and Internet of things equipment, the consensus block chain module is respectively connected with the local block chain module, the PKI module and the business service module, the business service module is connected with the PKI module, the local block chain module is connected with the PKI module, and the Internet of things equipment is connected with the local block chain module; the method comprises the following steps:
step ①, system initialization, namely, respectively generating a public and private key pair of a public key encryption system of a common block chain module, a local block chain module, a business service module and the Internet of things equipment through a PKI module;
step ②, when the user sends task request to the service module, the service module broadcasts status information inquiry request to the consensus blockchain module;
step ③, the common block chain module verifies the validity of the task request and performs common identification and packaging chain linking to the task request, after the common block chain module matches with the corresponding local block chain module, the common block chain module forwards the task request to the local block chain module;
④, the local block chain module verifies the identity of the user through the PKI module, verifies the authority of the user after the identity is verified, and guides the Internet of things equipment to make corresponding response after the authority is verified;
step ⑤, the internet of things equipment sends the task response data to the local area block chain module;
step ⑥, the local area blockchain module packs and chains the task response data, and transmits the task response data to the service module for monitoring the task request after the validity verification, the common identification and the packing and chain, and the service module verifies the task response data, decodes the data and feeds back the data to the user.
2. The method for controlling access to equipment of the internet of things based on the dual-blockchain structure according to claim 1, wherein the business service module is composed of a server with a communication module and a common block chain light node.
3. The Internet of things equipment access control method based on the double-block chain structure as claimed in claim 1, wherein the common identification block chain module is formed by networking three or more servers with communication modules and common identification block chain algorithms as common identification nodes and comprises legal configuration items.
4. The method for controlling access to equipment of the internet of things based on the dual-blockchain structure according to claim 1, wherein the local blockchain module is a server with a communication module and a local blockchain, and includes an authority configuration item of the equipment of the internet of things.
5. The method for controlling access to equipment of the internet of things based on the dual blockchain structure of claim 1, wherein the PKI module is a public key infrastructure comprising a communication module, a server, an encryption engine and a cipher engine.
6. The method for controlling access to internet of things equipment based on the dual-blockchain structure according to claim 1, wherein the internet of things equipment comprises a camera with a communication module, various environmental sensors and various edge computing devices.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010046368.7A CN111371543B (en) | 2020-01-08 | 2020-01-08 | Internet of things equipment access control method based on double-block chain structure |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010046368.7A CN111371543B (en) | 2020-01-08 | 2020-01-08 | Internet of things equipment access control method based on double-block chain structure |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111371543A true CN111371543A (en) | 2020-07-03 |
CN111371543B CN111371543B (en) | 2023-03-24 |
Family
ID=71207848
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010046368.7A Active CN111371543B (en) | 2020-01-08 | 2020-01-08 | Internet of things equipment access control method based on double-block chain structure |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111371543B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112004204A (en) * | 2020-08-12 | 2020-11-27 | 河海大学常州校区 | High-dimensional data anomaly detection method based on layered processing in industrial Internet of things |
CN112507301A (en) * | 2020-12-05 | 2021-03-16 | 广州技象科技有限公司 | Internet of things equipment control method, device, equipment and storage medium |
CN113179311A (en) * | 2021-04-23 | 2021-07-27 | 上海和数软件有限公司 | Block chain authority multiple control method and system |
WO2023155520A1 (en) * | 2022-02-21 | 2023-08-24 | 腾讯科技(深圳)有限公司 | Network connection method and apparatus, device, storage medium, and program product |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170048235A1 (en) * | 2015-07-14 | 2017-02-16 | Fmr Llc | Crypto Captcha and Social Aggregating, Fractionally Efficient Transfer Guidance, Conditional Triggered Transaction, Datastructures, Apparatuses, Methods and Systems |
US20180076957A1 (en) * | 2016-09-13 | 2018-03-15 | Hiroshi Watanabe | Network without Abuse of a Private Key |
US20180262493A1 (en) * | 2016-03-28 | 2018-09-13 | Black Gold Coin, Inc. | Systems and methods for providing block chain or distributed ledger-based entity identity and relationship verification |
CN108810073A (en) * | 2018-04-05 | 2018-11-13 | 西安电子科技大学 | A kind of Internet of Things multiple domain access control system and method based on block chain |
CN108833330A (en) * | 2018-04-08 | 2018-11-16 | 浙江商业职业技术学院 | A kind of rural area electronic commerce data authentication approach |
CN109002527A (en) * | 2018-07-13 | 2018-12-14 | 江苏开放大学(江苏城市职业学院) | A method of its management online exam of network test system and utilization based on block chain |
CN109150861A (en) * | 2018-04-25 | 2019-01-04 | 泰山·约克·维纳斯基 | block chain network communication system |
CN109547408A (en) * | 2018-10-09 | 2019-03-29 | 中国科学院重庆绿色智能技术研究院 | A kind of base station rotating ring information monitoring technology based on block chain management |
US20190164220A1 (en) * | 2017-11-27 | 2019-05-30 | Wipro Limited | System and method for dual blockchain based validation of instrument reference data and transaction reporting |
CN109918878A (en) * | 2019-04-24 | 2019-06-21 | 中国科学院信息工程研究所 | A kind of industrial internet of things equipment authentication and safety interacting method based on block chain |
CN109948003A (en) * | 2019-03-20 | 2019-06-28 | 武汉大学 | A kind of the block catenary system and its block production method of isomorphism bimodulus major-minor chain |
CN110109930A (en) * | 2019-05-15 | 2019-08-09 | 山东省计算中心(国家超级计算济南中心) | Government data storage, querying method and system based on block chain duplex structure |
US20190312877A1 (en) * | 2016-12-23 | 2019-10-10 | Cloudminds (Shenzhen) Robotics Systems Co., Ltd. | Block chain mining method, device, and node apparatus |
CN110430061A (en) * | 2019-07-19 | 2019-11-08 | 东南大学 | A kind of car networking equipment identities authentication method based on block chain technology |
WO2019242340A1 (en) * | 2018-06-22 | 2019-12-26 | 深圳前海益链网络科技有限公司 | Method for preventing short-term bifurcation and double-spend attack on block chain network |
-
2020
- 2020-01-08 CN CN202010046368.7A patent/CN111371543B/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170048235A1 (en) * | 2015-07-14 | 2017-02-16 | Fmr Llc | Crypto Captcha and Social Aggregating, Fractionally Efficient Transfer Guidance, Conditional Triggered Transaction, Datastructures, Apparatuses, Methods and Systems |
US20180262493A1 (en) * | 2016-03-28 | 2018-09-13 | Black Gold Coin, Inc. | Systems and methods for providing block chain or distributed ledger-based entity identity and relationship verification |
US20180076957A1 (en) * | 2016-09-13 | 2018-03-15 | Hiroshi Watanabe | Network without Abuse of a Private Key |
US20190312877A1 (en) * | 2016-12-23 | 2019-10-10 | Cloudminds (Shenzhen) Robotics Systems Co., Ltd. | Block chain mining method, device, and node apparatus |
US20190164220A1 (en) * | 2017-11-27 | 2019-05-30 | Wipro Limited | System and method for dual blockchain based validation of instrument reference data and transaction reporting |
CN108810073A (en) * | 2018-04-05 | 2018-11-13 | 西安电子科技大学 | A kind of Internet of Things multiple domain access control system and method based on block chain |
CN108833330A (en) * | 2018-04-08 | 2018-11-16 | 浙江商业职业技术学院 | A kind of rural area electronic commerce data authentication approach |
CN109150861A (en) * | 2018-04-25 | 2019-01-04 | 泰山·约克·维纳斯基 | block chain network communication system |
WO2019242340A1 (en) * | 2018-06-22 | 2019-12-26 | 深圳前海益链网络科技有限公司 | Method for preventing short-term bifurcation and double-spend attack on block chain network |
CN109002527A (en) * | 2018-07-13 | 2018-12-14 | 江苏开放大学(江苏城市职业学院) | A method of its management online exam of network test system and utilization based on block chain |
CN109547408A (en) * | 2018-10-09 | 2019-03-29 | 中国科学院重庆绿色智能技术研究院 | A kind of base station rotating ring information monitoring technology based on block chain management |
CN109948003A (en) * | 2019-03-20 | 2019-06-28 | 武汉大学 | A kind of the block catenary system and its block production method of isomorphism bimodulus major-minor chain |
CN109918878A (en) * | 2019-04-24 | 2019-06-21 | 中国科学院信息工程研究所 | A kind of industrial internet of things equipment authentication and safety interacting method based on block chain |
CN110109930A (en) * | 2019-05-15 | 2019-08-09 | 山东省计算中心(国家超级计算济南中心) | Government data storage, querying method and system based on block chain duplex structure |
CN110430061A (en) * | 2019-07-19 | 2019-11-08 | 东南大学 | A kind of car networking equipment identities authentication method based on block chain technology |
Non-Patent Citations (6)
Title |
---|
SHANTANU PAL ECT.: "On the Integration of Blockchain to the Internet of Things for Enabling Access Right Delegation", 《IEEE INTERNET OF THINGS JOURNAL》 * |
全立新等: "区块链技术在数字教育资源流通中的应用", 《电化教育研究》 * |
唐呈俊等: "区块链物联网设备与无线访问点双向认证方案", 《网络空间安全》 * |
张利华,蓝凡,姜攀攀,蒋腾飞: "基于双区块链的医疗记录安全存储与共享方案", 《计算机工程与科学》 * |
樊建峰等: "基于双区块链的基站动环信息监控***", 《计算机科学》 * |
高利等: "运用区块链技术构建数字化古籍管理体系模型的研究", 《图书情报工作》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112004204A (en) * | 2020-08-12 | 2020-11-27 | 河海大学常州校区 | High-dimensional data anomaly detection method based on layered processing in industrial Internet of things |
CN112004204B (en) * | 2020-08-12 | 2022-09-23 | 河海大学常州校区 | High-dimensional data anomaly detection method based on layered processing in industrial Internet of things |
CN112507301A (en) * | 2020-12-05 | 2021-03-16 | 广州技象科技有限公司 | Internet of things equipment control method, device, equipment and storage medium |
CN112507301B (en) * | 2020-12-05 | 2021-10-08 | 广州技象科技有限公司 | Internet of things equipment control method, device, equipment and storage medium |
CN113179311A (en) * | 2021-04-23 | 2021-07-27 | 上海和数软件有限公司 | Block chain authority multiple control method and system |
WO2023155520A1 (en) * | 2022-02-21 | 2023-08-24 | 腾讯科技(深圳)有限公司 | Network connection method and apparatus, device, storage medium, and program product |
Also Published As
Publication number | Publication date |
---|---|
CN111371543B (en) | 2023-03-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Feng et al. | Efficient and secure data sharing for 5G flying drones: A blockchain-enabled approach | |
CN111372243B (en) | Security distributed aggregation and access system and method based on fog alliance chain | |
CN111371543B (en) | Internet of things equipment access control method based on double-block chain structure | |
WO2021203733A1 (en) | Power edge gateway device and device-based sensor data uplink storage method | |
Shim | ${\cal CPAS} $: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks | |
Liu et al. | A dynamic secret-based encryption scheme for smart grid wireless communication | |
CN112039870B (en) | Privacy protection-oriented vehicle-mounted network authentication method and system based on block chain | |
CN113360925A (en) | Method and system for storing and accessing trusted data in electric power information physical system | |
CN113079215B (en) | Block chain-based wireless security access method for power distribution Internet of things | |
CN111447067A (en) | Encryption authentication method for power sensing equipment | |
CN115549932B (en) | Security access system and access method for massive heterogeneous Internet of things terminals | |
CN111447283A (en) | Method for realizing information security of power distribution station room system | |
CN101577620A (en) | Authentication method of Ethernet passive optical network (EPON) system | |
Tian et al. | Research on distributed blockchain‐based privacy‐preserving and data security framework in IoT | |
Naseer et al. | Blockchain-based decentralized lightweight control access scheme for smart grids | |
CN111294793A (en) | Data privacy protection method for identity authentication in wireless sensor network | |
Erroutbi et al. | Secure and lightweight HMAC mutual authentication protocol for communication between IoT devices and fog nodes | |
Zhang et al. | High-speed railway environmental monitoring data identity authentication scheme based on consortium blockchain | |
Heng et al. | A strong secure V2I authentication scheme from PKI and accumulator | |
Halgamuge | Latency estimation of blockchain-based distributed access control for cyber infrastructure in the iot environment | |
CN112069487B (en) | Intelligent equipment network communication safety implementation method based on Internet of things | |
Kanchan et al. | SAPSC: SignRecrypting authentication protocol using shareable clouds in VANET groups | |
Kamaev et al. | Key management schemes using routing information frames in secure wireless sensor networks | |
Mei et al. | An authentication and key agreement scheme based on roadside unit cache for VANET | |
Yang et al. | Cross domain authentication based on blockchain for mobile terminals in edge computing environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |