CN114979170B - Intelligent spectrum sharing system, method, device, electronic equipment and storage medium - Google Patents

Intelligent spectrum sharing system, method, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114979170B
CN114979170B CN202210695453.5A CN202210695453A CN114979170B CN 114979170 B CN114979170 B CN 114979170B CN 202210695453 A CN202210695453 A CN 202210695453A CN 114979170 B CN114979170 B CN 114979170B
Authority
CN
China
Prior art keywords
user node
node
public key
operator
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210695453.5A
Other languages
Chinese (zh)
Other versions
CN114979170A (en
Inventor
赵晓垠
黄韬
王庆扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202210695453.5A priority Critical patent/CN114979170B/en
Publication of CN114979170A publication Critical patent/CN114979170A/en
Application granted granted Critical
Publication of CN114979170B publication Critical patent/CN114979170B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the disclosure provides an intelligent spectrum sharing system, an intelligent spectrum sharing method, an intelligent spectrum sharing device, an intelligent spectrum sharing electronic device and an intelligent spectrum sharing storage medium, wherein a user node and a plurality of AP nodes are subjected to intelligent contract, so that the user is not limited to be subjected to intelligent contract with only one AP node, mutual trust among the AP nodes is realized based on the intelligent contract, spectrum sharing among the AP nodes is realized, and idle spectrum resources can be more fully utilized. And the data to be transmitted by the user node is encrypted and decrypted through the first private key and the first public key, so that the AP node can acquire the first public key from the intelligent contract only if an operator to which the AP node belongs is an operator allowing access to the data of the user node, further, the second data is decrypted based on the first public key, the data transmitted by the user node is acquired, the privacy protection of the data of the user node is realized, and the safety of the data is improved.

Description

Intelligent spectrum sharing system, method, device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of mobile communications technologies, and in particular, to an intelligent spectrum sharing system, method, apparatus, electronic device, and storage medium.
Background
At the world mobile conference in 2018, the federal communications commission has proposed a preliminary idea of deployment of blockchains to 6G, and with the densification of future networks, blockchain-based intelligent spectrum sharing will be a trend of future 6G.
Disclosure of Invention
The embodiment of the disclosure aims to provide an intelligent spectrum sharing system, an intelligent spectrum sharing method, an intelligent spectrum sharing device, electronic equipment and a storage medium. The specific technical scheme is as follows:
The embodiment of the disclosure provides an intelligent spectrum sharing system, which comprises:
A user node and a plurality of AP nodes, wherein the user node and at least two target AP nodes in the plurality of AP nodes have signed an intelligent contract, and the intelligent contract comprises a first private key and a first public key for encrypting and decrypting data of the user node; the frequency spectrums of different AP nodes are different;
The user node is used for acquiring a first private key from the intelligent contract, encrypting first data to be transmitted of the user node based on the first private key to obtain second data, and sending the second data; wherein the first private key is determined based on the first public key and identity information of the user; the first public key is determined based on identification information of a target operator, the target operator being an operator that is allowed to access data of the user node;
and the target AP node is used for acquiring the first public key from the intelligent contract under the condition that the intelligent contract allows the intelligent contract to acquire the first data of the user node, and decrypting the second data through the first public key to acquire the first data.
In a possible embodiment, the user node is further configured to send a first access request to a first target AP node;
The first target AP node is used for judging whether the user node is allowed to access after the first access request passes authentication; if the communication connection is allowed, authorizing the user node to use the self spectrum communication, and distributing a second public key and a second private key for communication connection for the user node; sending the second private key to the user node, and writing the second public key into a blockchain network;
the user node is further configured to send a second access request to a second target AP node, where the second access request includes the second private key;
The second target AP node is configured to query the second public key in the blockchain network in response to the second access request, verify the second access request based on the second public key, and determine whether to allow the user node to access if the second access request passes the verification; and if so, authorizing the user node to use the self spectrum communication.
In a possible embodiment, the AP node is configured to establish a smart contract of the user node, the first target AP node, and the second target AP node, where the smart contract includes a plurality of contract entries, where the contract entries include a first private key, a first public key, and whether a spectrum of the first target AP node is greater than a preset spectrum threshold; whether the frequency spectrum of the second target AP node is larger than a preset frequency spectrum threshold value or not; whether the balance of the user node is greater than a preset balance threshold; identification information of an operator to which the first target AP node belongs; and the identification information of the operator to which the second target AP node belongs.
In a possible embodiment, the first target AP node is specifically configured to:
determining whether the balance of the user node is larger than a preset balance threshold value and whether the user node has enough frequency spectrum, and determining that the user node is allowed to access under the condition that the balance of the user node is larger than the preset balance threshold value and the user node has enough frequency spectrum;
the second target AP node is specifically configured to:
Determining whether the balance of the user node is larger than a preset balance threshold value and whether the user node has enough frequency spectrum, and determining that the user node is allowed to access under the condition that the balance of the user node is larger than the preset balance threshold value and the user node has enough frequency spectrum.
In a possible embodiment, the AP node is specifically configured to obtain, after authorizing the user node to use its own spectrum communication, identification information of a target operator, where the target operator is an operator that allows access to data transmitted by the user node;
Generating a first public key of the user node based on the identification information of the target operator; transmitting the first public key to an AP node of the target operator of the affiliated operator;
generating a first private key based on the first public key and identity information of the user node; and sending the first private key to the user node; and enabling the user node to digitally sign the transmitted transmission data by using the first private key.
In a possible embodiment, the first target AP node is an operator node of the user node.
The embodiment of the disclosure also provides an intelligent spectrum sharing method applied to the AP node, which comprises the following steps:
Receiving second data sent by a user node under the condition that the AP node and the user node have signed an intelligent contract, wherein the second data is obtained after the user node encrypts first data to be transmitted by using a first private key in the intelligent contract, and the first private key is determined based on a first public key and identity information of the user node;
Acquiring the first public key from the intelligent contract under the condition that the intelligent contract allows the AP node to acquire first data of the user node; wherein the first public key is determined based on identification information of a target operator, the target operator being an operator that is allowed to access data of the user node;
and decrypting the second data through the first public key to obtain the first data.
In a possible embodiment, the method further comprises:
under the condition that a first access request sent by a first user node is received, authenticating the first access request;
After the authentication of the first access request is passed, judging whether the AP node allows the first user node to access;
If so, authorizing the first user node to use the spectrum communication of the AP node, and distributing a second public key and a second private key for communication connection to the first user node;
and sending the second private key of the first user node to the first user node, and writing the second public key of the first user node into a blockchain network.
In a possible embodiment, the method further comprises:
under the condition that a second access request sent by a second user node is received, inquiring a second public key of the second user node in the blockchain network, wherein the access request of the second user node is obtained based on a second private key of the second user node;
Verifying a second access request of the second user node based on a second public key of the second user node, and judging whether the AP node allows the second user node to access or not under the condition that the second access request passes the verification; and if so, authorizing the second user node to use the spectrum communication of the AP node.
In a possible embodiment, the smart contract includes a plurality of contract items, where the contract items include a first private key, a first public key, and whether a remaining spectrum of each AP node that signs the smart contract with the user node is greater than a preset spectrum threshold; whether the balance of the user node is greater than a preset balance threshold; and signing the identification information of the operator to which each AP node of the intelligent contract belongs with the user node.
In a possible embodiment, the method further comprises:
After authorizing the user node to use the spectrum communication of the AP node, acquiring identification information of a target operator, wherein the target operator is an operator allowing access to transmission data of the user node;
generating a first public key of the user node based on the identification information of the target operator; generating a first private key based on the first public key and identity information of the user node; the first public key and the first private key are stored in the smart contract.
In a possible embodiment, the AP node is an operator node of the first user node.
The embodiment of the disclosure also provides an intelligent spectrum sharing device, which is applied to an AP node, and comprises:
A receiving module, configured to receive second data sent by a user node when the AP node and the user node have signed an intelligent contract, where the second data is obtained after the user node encrypts first data to be transmitted by using a first private key in the intelligent contract, and the first private key is determined based on a first public key and identity information of the user node;
An obtaining module, configured to obtain, in a case where the intelligent contract allows the AP node to obtain the first data of the user node, the first public key from the intelligent contract; wherein the first public key is determined based on identification information of a target operator, the target operator being an operator that is allowed to access data of the user node;
And the decryption module is used for decrypting the second data through the first public key to obtain the first data.
In a possible embodiment, the apparatus comprises:
the first authentication module is used for authenticating a first access request sent by a first user node under the condition that the first access request is received;
The judging module is used for judging whether the AP node allows the first user node to access after the authentication of the first access request is passed;
The first authorization module is used for authorizing the first user node to use the spectrum communication of the AP node if the first user node is allowed to use, and distributing a second public key and a second private key for communication connection to the first user node;
And the sending module is used for sending the second private key of the first user node to the first user node and writing the second public key of the first user node into the blockchain network.
In a possible embodiment, the apparatus further comprises:
the query module is used for querying a second public key of a second user node in the blockchain network under the condition that a second access request sent by the second user node is received, wherein the access request of the second user node is obtained based on the second private key of the second user node;
A second authorization module, configured to verify a second access request of the second user node based on a second public key of the second user node, and determine whether the AP node allows the second user node to access if the second access request passes the verification; and if so, authorizing the second user node to use the spectrum communication of the AP node.
In a possible embodiment, the smart contract includes a plurality of contract items, where the contract items include a first private key, a first public key, and whether a remaining spectrum of each AP node that signs the smart contract with the user node is greater than a preset spectrum threshold; whether the balance of the user node is greater than a preset balance threshold; and signing the identification information of the operator to which each AP node of the intelligent contract belongs with the user node.
In a possible embodiment, the apparatus further comprises:
An operator information obtaining module, configured to obtain, after authorizing the user node to use the spectrum communication of the AP node, identification information of a target operator, where the target operator is an operator that allows access to transmission data of the user node;
A generation module, configured to generate a first public key of the user node based on the identification information of the target operator; generating a first private key based on the first public key and identity information of the user node; the first public key and the first private key are stored in the smart contract.
In a possible embodiment, the first target AP node is an operator node of the user node.
The embodiment of the disclosure also provides electronic equipment, which comprises a processor, a communication interface, a memory and a communication bus, wherein the processor and the communication interface, and the memory are communicated with each other through the communication bus;
A memory for storing a computer program;
And the processor is used for realizing the intelligent spectrum sharing method when executing the program stored in the memory.
The disclosed embodiments also provide a computer readable storage medium having a computer program stored therein, which when executed by a processor, implements any of the above-described intelligent spectrum sharing methods.
The disclosed embodiments also provide a computer program product containing instructions that, when run on a computer, cause the computer to perform any of the intelligent spectrum sharing methods described above.
Drawings
In order to more clearly illustrate the embodiments of the present disclosure or the technical solutions in the prior art, the following description will briefly introduce the drawings that are required to be used in the embodiments or the description of the prior art, and it is apparent that the drawings in the following description are only some embodiments of the present disclosure, and other embodiments may be obtained according to these drawings to those of ordinary skill in the art.
Fig. 1 is a first schematic diagram of an intelligent spectrum sharing system according to an embodiment of the disclosure;
FIG. 2 is a schematic diagram of signing a smart contract provided by an embodiment of the present disclosure;
fig. 3 is a second schematic diagram of an intelligent spectrum sharing system according to an embodiment of the disclosure;
fig. 4 is a second schematic diagram of an intelligent spectrum sharing system according to an embodiment of the disclosure;
fig. 5 is a schematic flow chart of an intelligent spectrum sharing method according to an embodiment of the disclosure;
fig. 6 is a schematic structural diagram of an intelligent spectrum sharing device according to an embodiment of the disclosure;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the disclosure.
Detailed Description
The following description of the technical solutions in the embodiments of the present disclosure will be made clearly and completely with reference to the accompanying drawings in the embodiments of the present disclosure, and it is apparent that the described embodiments are only some embodiments of the present disclosure, not all embodiments. Based on the embodiments in the present disclosure, all other embodiments obtained by a person of ordinary skill in the art based on the present disclosure are within the scope of protection of the present disclosure.
The embodiment of the disclosure discloses an intelligent spectrum sharing system, an intelligent spectrum sharing method, an intelligent spectrum sharing device, an intelligent spectrum sharing electronic device and an intelligent spectrum sharing medium, and the intelligent spectrum sharing system, the intelligent spectrum sharing method, the intelligent spectrum sharing device, the intelligent spectrum sharing electronic device and the intelligent spectrum sharing medium are respectively described below.
An embodiment of the present disclosure provides an intelligent spectrum sharing system, referring to fig. 1, fig. 1 is a schematic diagram of intelligent spectrum sharing according to an embodiment of the present disclosure, including:
The embodiment of the disclosure provides an intelligent spectrum sharing system, which comprises:
A user node 110, a plurality of AP (WIRELESS ACCESS points ) nodes 120, wherein the user node 110 and at least two target AP nodes 120 of the plurality of AP nodes 120 have signed an intelligent contract, and the intelligent contract includes a first private key and a first public key for encrypting and decrypting data of the user node 110; the frequency spectrum of the different AP nodes 120 is different;
The user node 110 is configured to obtain a first private key from the intelligent contract, encrypt, based on the first private key, first data to be transmitted to itself to obtain second data, and send the second data; wherein the first private key is determined based on the first public key and identity information of the user; the first public key is determined based on identification information of a target operator, which is an operator that is allowed to access data of the user node 110;
The target AP node 120 is configured to obtain the first public key from the smart contract when the smart contract allows itself to obtain the first data of the user node 110, and decrypt the second data with the first public key to obtain the first data.
The user node and the plurality of AP nodes sign an intelligent contract, and the user is not limited to sign an intelligent contract with only one AP node through the intelligent contract, and mutual trust among the AP nodes can be realized based on the intelligent contract, so that spectrum sharing among the AP nodes is realized, and idle spectrum resources can be more fully utilized. Moreover, for the data to be transmitted by the user node, the data to be transmitted by the user node is encrypted and decrypted through the first private key and the first public key, and not all the AP nodes can acquire the first public key, but the user node firstly prescribes an operator which allows access to the data, and only if the operator to which the AP node belongs is the operator which allows access to the data of the user node, the AP node can acquire the first public key from the intelligent contract, further decrypt the second data based on the first public key and acquire the data transmitted by the user node, so that the privacy protection of the data of the user node is realized, and the security of the data is improved.
The user node may establish an intelligent contract with a plurality of target AP nodes, where the contract items included in the intelligent contract include whether the spectrum of each target AP node 120 is greater than a preset spectrum threshold; whether the balance of the user node is greater than a preset balance threshold; and the identification information of the operator to which the target AP node belongs. If the above conditions are satisfied, the target AP node may provide a frequency band for the user node based on its own frequency spectrum, where the target AP node provides the frequency band for the user node as a frequency band in the own frequency spectrum of the target AP node, so that the user node may trade with multiple AP nodes, and each AP node may dynamically share and use the licensed spectrum owned by each AP node through the blockchain network.
In order to realize the privacy protection of the data of the user node, the security of the data is improved. The AP node which signs an intelligent contract with the user node can only acquire the data transmitted by the user node by the AP node which allows the data to be accessed, specifically, the identity information of the user can be written into a blockchain, wherein the identity information of the user comprises the identity of the user, the balance of the user and the like; after the intelligent contract is signed, the intelligent contract can acquire the identity information of the user from the blockchain, the user allows access to the information of the operator of the AP of the data, specifically, the information of the operator can be any one of the identification information of the operator, then a first public key is generated based on the information, a first private key is generated based on the first public key and the identity information of the user, and for each AP node, whether the operator of the AP stage is the operator of the AP of which the access to the data is allowed or not is judged, and if so, the first public key is sent to the AP node. When the user node transmits data by utilizing the frequency spectrum allocated to the user node, the user node performs data signature on first data to be transmitted through a first private key to acquire an AP node of the first public key, and the encrypted data can be decrypted by utilizing the first public key, so that the content transmitted by the user is acquired.
In a possible embodiment, the user node 110 is further configured to send a first access request to the first target AP node 120;
The first target AP node 120 is configured to determine whether to allow the user node 110 to access after the first access request passes authentication; if so, authorizing the user node 110 to use its own spectrum communication, and distributing a second public key and a second private key for communication connection to the user node 110; transmitting the second private key to the user node 110, and writing the second public key to a blockchain network;
The user node 110 is further configured to send a second access request to a second target AP node 120, where the second access request is obtained based on the second private key;
The second target AP node 120 is configured to query the second public key in the blockchain network in response to the second access request, verify the second access request based on the second public key, and determine whether to allow the user node 110 to access if the second access request passes the verification; if so, the user node 110 is authorized to use its own spectrum communication.
When the intelligent contract is built, the user node firstly sends a first access request to the first target AP node, then the first target AP node firstly authenticates the first access request, after the first access request passes, the first target AP node judges whether the user node is allowed to access or not, if so, the user node is authorized to use the self spectrum communication, a second public key and a second private key for communication connection are distributed to the user node, the second private key is sent to the user node, the second public key is written into the blockchain network, so that the user node can communicate based on the second private key and the second public key when the blockchain network communicates, the specific first target AP node can inform the second private key to the user node in an encrypted mode, and then the second public key is written into the blockchain network in a broadcasting mode.
When the user node sends a second access request to a second target AP node, the second access request is digitally signed based on a second private key, the second target AP node firstly inquires a second public key in the blockchain network in response to the second access request, verifies the second access request based on the second public key, and judges whether the user node is allowed to access or not under the condition that the user node passes the verification; if so, the user node is authorized to use its own spectrum communication, wherein the number of second target AP nodes may be plural. Thus, each AP node can dynamically share and use the authorized spectrum owned by each AP node through the blockchain network.
In a possible embodiment, the AP node 120 is configured to establish a smart contract for the user node 110, the first target AP node 120, and the second target AP node 120, where the smart contract includes a plurality of contract entries, and the contract entries include a first private key, a first public key, and whether a spectrum of the first target AP node 120 is greater than a preset spectrum threshold; whether the spectrum of the second target AP node 120 is greater than a preset spectrum threshold; whether the balance of the user node 110 is greater than a preset balance threshold; identification information of an operator to which the first target AP node 120 belongs; the second target AP node 120 belongs to the operator's identification information.
The user node, the first target AP node and the second target AP node may establish an intelligent contract, where the number of the first target AP node and the second target AP node may be plural, so that the user may establish an intelligent contract with the plurality of APs, where a contract item included in the intelligent contract includes whether a spectrum of the first target AP node 120 is greater than a preset spectrum threshold; whether the spectrum of the second target AP node 120 is greater than a preset spectrum threshold; whether the balance of the user node 110 is greater than a preset balance threshold; identification information of an operator to which the first target AP node 120 belongs; the second target AP node 120 belongs to the operator's identification information. Wherein the balance of the user node can be written into the blockchain network, so that each AP node can acquire the balance of the user node from the blockchain network.
As shown in fig. 2, the user node 1 and the AP2 make a smart contract, where a specific smart contract includes a plurality of contract items, and specifically includes: whether AP1 has enough spectrum, whether AP2 has enough spectrum, whether the user has enough full power and is entitled to access AP1 and AP2 for dual connectivity, and the information of the operators to which AP1 and AP2 belong. If the above contract terms are both met, then AP1 and AP2 may provide the user node with spectrum whereby the user transacts with AP1 and AP 2. Specifically, as shown in fig. 3, after the user node signs an intelligent contract with the AP1 and the AP2, the intelligent contract is deployed in the blockchain network, when the user transmits data, the blockchain node performs mining verification according to the intelligent contract, each block confirms the intelligent contract for multiple times for each AP node, and when the intelligent contract is confirmed to pass, the user can utilize the frequency spectrum of the AP node to transmit data.
In one possible embodiment, the first target AP node 120 is specifically configured to:
Determining whether the balance of the user node 110 is greater than a preset balance threshold value and whether the user node has enough frequency spectrum, and determining that the user node 110 is allowed to access if the balance of the user node 110 is greater than the preset balance threshold value and the user node has enough frequency spectrum;
The second target AP node 120 is specifically configured to:
Determining whether the balance of the user node 110 is greater than a preset balance threshold and whether the user node has enough spectrum, and if the balance of the user node 110 is greater than the preset balance threshold and the user node has enough spectrum, determining that the user node 110 is allowed to access.
For each target AP node, when the user node requests access, firstly verifying the identity of the user node, and judging whether the user node is allowed to access or not when the identity verification passes, specifically, judging whether the balance of the user node is larger than a preset balance threshold value or not and whether the target AP node has enough frequency spectrum or not, and under the condition that the balance of the user node is larger than the preset balance threshold value and the AP node has enough frequency spectrum, determining that the user node is allowed to access.
In a possible embodiment, the AP node 120 is specifically configured to obtain, after authorizing the user node 110 to use its own spectrum communication, identification information of a target operator, where the target operator is an operator that allows access to the transmission data of the user node 110;
Generating a first public key of the user node 110 based on the identification information of the target operator; and transmitting the first public key to the AP node 120 of the target operator to which the operator belongs;
Generating a first private key based on the first public key and the identity information of the user node 110; and transmitting the first private key to the user node 110; so that the user node 110 digitally signs the transmitted transmission data using the first private key.
In a possible embodiment, the first target AP node 120 is an operator node of the user node 110.
The user node allows the affiliated operator to access the transmission data of the AP node of the operator to which the user node belongs, so that the AP node except the self-affiliated operator cannot access the transmission data of the AP node, and the safety of intelligent spectrum sharing is improved.
Based on the above embodiments, the disclosure provides a flow chart of intelligent spectrum sharing, as shown in fig. 4, including:
s410, the user node and the two AP nodes are contracted for intelligent contract;
s420, the intelligent contract acquires identity information of the user node, operator information of the user node and operator information for allowing the user node to access data of the user node from the blockchain;
S430, the intelligent contract generates a public-private key, namely a first private key and a first public key, which are used for encrypting data of the user node;
S440, for each AP node, judging whether the operator to which the AP node belongs is an operator of which the user node allows access to the data of the user node, if so, sending the first public key to the AP node, and sending the first private key to the user node;
S450, when the user node sends data in the allocated frequency spectrum, the data to be transmitted is digitally signed by using the first private key;
S460, for each AP node, if the AP node acquires the first public key, the transmitted content can be decrypted by using the first public key to obtain the transmission data, and if the AP node does not acquire the first public key, the transmission data of the user cannot be acquired.
The user node and the 2 AP nodes are signed with the intelligent contract, so that the user is not limited to signing the intelligent contract with only one AP node, and mutual trust among the 2 AP nodes is realized based on the intelligent contract, thereby realizing spectrum sharing among the AP nodes, and further, idle spectrum resources can be more fully utilized. Moreover, for the data to be transmitted by the user node, the data to be transmitted by the user node is encrypted and decrypted through the first private key and the first public key, and not all the AP nodes can acquire the first public key, but the user node firstly prescribes an operator which allows access to the data, and only if the operator to which the AP node belongs is the operator which allows access to the data of the user node, the AP node can acquire the first public key from the intelligent contract, further decrypt the second data based on the first public key and acquire the data transmitted by the user node, so that the privacy protection of the data of the user node is realized, and the security of the data is improved.
As shown in fig. 5, fig. 5 is an intelligent spectrum sharing method provided by an embodiment of the present disclosure, applied to an AP node, where the method includes:
S510, receiving second data sent by the user node under the condition that the AP node and the user node have signed an intelligent contract, wherein the second data is obtained after the user node encrypts first data to be transmitted by using a first private key in the intelligent contract, and the first private key is determined based on a first public key and identity information of the user node;
S520, when the intelligent contract allows the AP node to acquire the first data of the user node, acquiring the first public key from the intelligent contract; wherein the first public key is determined based on identification information of a target operator, the target operator being an operator that allows access to data of the user node;
and S530, decrypting the second data through the first public key to obtain the first data.
In a possible embodiment, the method further includes:
Under the condition that a first access request sent by a first user node is received, authenticating the first access request;
After the authentication of the first access request is passed, judging whether the AP node allows the first user node to access;
if so, authorizing the first user node to use the spectrum communication of the AP node, and distributing a second public key and a second private key for communication connection to the first user node;
And sending the second private key of the first user node to the first user node, and writing the second public key of the first user node into the blockchain network.
In a possible embodiment, the method further includes:
Under the condition that a second access request sent by a second user node is received, inquiring a second public key of the second user node in the blockchain network, wherein the access request of the second user node is obtained based on a second private key of the second user node;
Verifying a second access request of the second user node based on a second public key of the second user node, and judging whether the AP node allows the second user node to access or not under the condition that the second access request passes the verification; and if so, authorizing the second user node to use the spectrum communication of the AP node.
In a possible embodiment, the smart contract includes a plurality of contract entries, where the contract entries include a first private key, a first public key, and whether a remaining spectrum of each AP node that signs the smart contract with the user node is greater than a preset spectrum threshold; whether the balance of the user node is larger than a preset balance threshold value or not; and the user node signs the identification information of the operator to which each AP node of the intelligent contract belongs.
In a possible embodiment, the method further includes:
After authorizing the user node to use the spectrum communication of the AP node, acquiring identification information of a target operator, wherein the target operator is an operator allowing access to the transmission data of the user node;
Generating a first public key of the user node based on the identification information of the target operator; generating a first private key based on the first public key and identity information of the user node; the first public key and the first private key are stored in the smart contract.
In a possible embodiment, the AP node is an operator node of the first user node.
Based on the above method embodiment, the embodiment of the present disclosure further provides an intelligent spectrum sharing device, which is applied to an AP node, as shown in fig. 6, and fig. 6 is a schematic structural diagram of the intelligent spectrum sharing device provided by the embodiment of the present disclosure, where the device includes:
A receiving module 610, configured to receive second data sent by a user node when the AP node and the user node have signed an intelligent contract, where the second data is obtained after the user node encrypts first data to be transmitted using a first private key in the intelligent contract, and the first private key is determined based on a first public key and identity information of the user node;
An obtaining module 620, configured to obtain the first public key from the smart contract if the smart contract allows the AP node to obtain the first data of the user node; wherein the first public key is determined based on identification information of a target operator, the target operator being an operator that allows access to data of the user node;
the decryption module 630 is configured to decrypt the second data by using the first public key, so as to obtain the first data.
In a possible embodiment, the apparatus includes:
The first authentication module is used for authenticating the first access request under the condition of receiving the first access request sent by the first user node;
The judging module is used for judging whether the AP node allows the first user node to access after the authentication of the first access request is passed;
The first authorization module is used for authorizing the first user node to use the spectrum communication of the AP node if the first user node is allowed to use, and distributing a second public key and a second private key for communication connection to the first user node;
and the sending module is used for sending the second private key of the first user node to the first user node and writing the second public key of the first user node into the blockchain network.
In a possible embodiment, the apparatus further comprises:
the query module is used for querying a second public key of the second user node in the blockchain network under the condition that a second access request sent by the second user node is received, wherein the access request of the second user node is obtained based on the second private key of the second user node;
the second authorization module is configured to verify a second access request of the second user node based on a second public key of the second user node, and if the second access request passes the verification, determine whether the AP node allows the second user node to access; and if so, authorizing the second user node to use the spectrum communication of the AP node.
In a possible embodiment, the smart contract includes a plurality of contract entries, where the contract entries include a first private key, a first public key, and whether a remaining spectrum of each AP node that signs the smart contract with the user node is greater than a preset spectrum threshold; whether the balance of the user node is larger than a preset balance threshold value or not; and the user node signs the identification information of the operator to which each AP node of the intelligent contract belongs.
In a possible embodiment, the apparatus further comprises:
An operator information obtaining module, configured to obtain, after authorizing the user node to use the spectrum communication of the AP node, identification information of a target operator, where the target operator is an operator that allows access to transmission data of the user node;
The generation module is used for generating a first public key of the user node based on the identification information of the target operator; generating a first private key based on the first public key and identity information of the user node; the first public key and the first private key are stored in the smart contract.
In a possible embodiment, the first target AP node is an operator node of the user node.
The disclosed embodiment also provides an electronic device, as shown in fig. 7, comprising a processor 701, a communication interface 702, a memory 703 and a communication bus 704, wherein the processor 701, the communication interface 702, the memory 703 complete communication with each other through the communication bus 704,
A memory 703 for storing a computer program;
the processor 701 is configured to execute the program stored in the memory 703, and implement the following steps:
Receiving second data sent by the user node under the condition that the AP node and the user node have signed an intelligent contract, wherein the second data is obtained by encrypting first data to be transmitted by the user node by using a first private key in the intelligent contract, and the first private key is determined based on a first public key and identity information of the user node;
Acquiring the first public key from the intelligent contract when the intelligent contract allows the AP node to acquire the first data of the user node; wherein the first public key is determined based on identification information of a target operator, the target operator being an operator that allows access to data of the user node;
And decrypting the second data through the first public key to obtain the first data.
Optionally, the processor 701 is configured to execute a program stored in the memory 703, and may implement any of the above-mentioned intelligent spectrum sharing methods.
The communication bus mentioned above for the electronic device may be a peripheral component interconnect standard (PERIPHERAL COMPONENT INTERCONNECT, PCI) bus or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, etc. The communication bus may be classified as an address bus, a data bus, a control bus, or the like. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
The communication interface is used for communication between the electronic device and other devices.
The Memory may include random access Memory (Random Access Memory, RAM) or may include Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the aforementioned processor.
The processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; but may also be a digital signal Processor (DIGITAL SIGNAL Processor, DSP), application SPECIFIC INTEGRATED Circuit (ASIC), field-Programmable gate array (Field-Programmable GATE ARRAY, FPGA) or other Programmable logic device, discrete gate or transistor logic device, discrete hardware components.
In yet another embodiment provided by the present disclosure, there is also provided a computer readable storage medium having stored therein a computer program which, when executed by a processor, implements the steps of any of the above-described intelligent spectrum sharing methods.
In yet another embodiment provided by the present disclosure, there is also provided a computer program product containing instructions that, when run on a computer, cause the computer to perform any of the intelligent spectrum sharing methods of the above embodiments.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present disclosure, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another, for example, by wired (e.g., coaxial cable, optical fiber, digital Subscriber Line (DSL)), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid state disk Solid STATE DISK (SSD)), etc.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In this specification, each embodiment is described in a related manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for method, apparatus, electronic device, computer readable storage medium, and computer program product embodiments containing instructions, the description is relatively simple as it is substantially similar to the method embodiments, with reference to portions of the system embodiments being relevant.
The foregoing description is only of the preferred embodiments of the present disclosure, and is not intended to limit the scope of the present disclosure. Any modification, equivalent replacement, improvement, etc. made within the spirit and principles of the present disclosure are included in the protection scope of the present disclosure.

Claims (20)

1. An intelligent spectrum sharing system, comprising:
A user node and a plurality of AP nodes, wherein the user node and at least two target AP nodes in the plurality of AP nodes have signed an intelligent contract, and the intelligent contract comprises a first private key and a first public key for encrypting and decrypting data of the user node; the frequency spectrums of different AP nodes are different;
The user node is used for acquiring a first private key from the intelligent contract, encrypting first data to be transmitted of the user node based on the first private key to obtain second data, and sending the second data; wherein the first private key is determined based on the first public key and identity information of the user; the first public key is determined based on identification information of a target operator, the target operator being an operator that is allowed to access data of the user node;
The target AP node is configured to obtain the first public key from the intelligent contract when the intelligent contract allows the intelligent contract to obtain the first data of the user node, and decrypt the second data through the first public key to obtain the first data;
In case the operator to which the AP node belongs is an operator allowing access to the data of the user node, the smart contract allows said AP node to obtain said first data.
2. The system of claim 1, wherein the system further comprises a controller configured to control the controller,
The user node is further configured to send a first access request to a first target AP node;
The first target AP node is used for judging whether the user node is allowed to access after the first access request passes authentication; if the communication connection is allowed, authorizing the user node to use the self spectrum communication, and distributing a second public key and a second private key for communication connection for the user node; sending the second private key to the user node, and writing the second public key into a blockchain network;
The user node is further configured to send a second access request to a second target AP node, where the second access request is obtained based on the second private key;
The second target AP node is configured to query the second public key in the blockchain network in response to the second access request, verify the second access request based on the second public key, and determine whether to allow the user node to access if the second access request passes the verification; and if so, authorizing the user node to use the self spectrum communication.
3. The system of claim 2, wherein the system further comprises a controller configured to control the controller,
The AP node is configured to establish an intelligent contract of the user node, the first target AP node, and the second target AP node, where the intelligent contract includes a plurality of contract entries, and the contract entries include a first private key, a first public key, and whether a spectrum of the first target AP node is greater than a preset spectrum threshold; whether the frequency spectrum of the second target AP node is larger than a preset frequency spectrum threshold value or not; whether the balance of the user node is greater than a preset balance threshold; identification information of an operator to which the first target AP node belongs; and the identification information of the operator to which the second target AP node belongs.
4. The system of claim 2, wherein the system further comprises a controller configured to control the controller,
The first target AP node is specifically configured to:
determining whether the balance of the user node is larger than a preset balance threshold value and whether the user node has enough frequency spectrum, and determining that the user node is allowed to access under the condition that the balance of the user node is larger than the preset balance threshold value and the user node has enough frequency spectrum;
the second target AP node is specifically configured to:
Determining whether the balance of the user node is larger than a preset balance threshold value and whether the user node has enough frequency spectrum, and determining that the user node is allowed to access under the condition that the balance of the user node is larger than the preset balance threshold value and the user node has enough frequency spectrum.
5. The system of claim 3, wherein the system further comprises a controller configured to control the controller,
The AP node is specifically configured to obtain, after authorizing the user node to use its own spectrum communication, identification information of a target operator, where the target operator is an operator that allows access to transmission data of the user node;
Generating a first public key of the user node based on the identification information of the target operator; transmitting the first public key to an AP node of the target operator of the affiliated operator;
generating a first private key based on the first public key and identity information of the user node; and sending the first private key to the user node; and enabling the user node to digitally sign the transmitted transmission data by using the first private key.
6. The system of claim 2, wherein the first target AP node is an operator node of the user node.
7. An intelligent spectrum sharing method, applied to an AP node, comprising:
Receiving second data sent by a user node under the condition that the AP node and the user node have signed an intelligent contract, wherein the second data is obtained after the user node encrypts first data to be transmitted by using a first private key in the intelligent contract, and the first private key is determined based on a first public key and identity information of the user node;
Acquiring the first public key from the intelligent contract under the condition that the intelligent contract allows the AP node to acquire first data of the user node; the first public key is determined based on identification information of a target operator, wherein the target operator is an operator allowing access to data of a user node, and an intelligent contract allows the AP node to acquire the first data under the condition that the operator of the AP node is the operator allowing access to the data of the user node;
and decrypting the second data through the first public key to obtain the first data.
8. The method of claim 7, wherein the method further comprises:
under the condition that a first access request sent by a first user node is received, authenticating the first access request;
After the authentication of the first access request is passed, judging whether the AP node allows the first user node to access;
If so, authorizing the first user node to use the spectrum communication of the AP node, and distributing a second public key and a second private key for communication connection to the first user node;
and sending the second private key of the first user node to the first user node, and writing the second public key of the first user node into a blockchain network.
9. The method of claim 8, wherein the method further comprises:
under the condition that a second access request sent by a second user node is received, inquiring a second public key of the second user node in the blockchain network, wherein the access request of the second user node is obtained based on a second private key of the second user node;
Verifying a second access request of the second user node based on a second public key of the second user node, and judging whether the AP node allows the second user node to access or not under the condition that the second access request passes the verification; and if so, authorizing the second user node to use the spectrum communication of the AP node.
10. The method of claim 7, wherein the smart contract comprises a plurality of contract entries including a first private key, a first public key, whether a remaining spectrum of each AP node with which the user node subscribes to the smart contract is greater than a preset spectrum threshold; whether the balance of the user node is greater than a preset balance threshold; and signing the identification information of the operator to which each AP node of the intelligent contract belongs with the user node.
11. The method according to claim 10, wherein the method further comprises:
After authorizing the user node to use the spectrum communication of the AP node, acquiring identification information of a target operator, wherein the target operator is an operator allowing access to transmission data of the user node;
generating a first public key of the user node based on the identification information of the target operator; generating a first private key based on the first public key and identity information of the user node; the first public key and the first private key are stored in the smart contract.
12. The method of claim 8, wherein the AP node is an operator node of the first user node.
13. An intelligent spectrum sharing apparatus, applied to an AP node, comprising:
A receiving module, configured to receive second data sent by a user node when the AP node and the user node have signed an intelligent contract, where the second data is obtained after the user node encrypts first data to be transmitted by using a first private key in the intelligent contract, and the first private key is determined based on a first public key and identity information of the user node;
An obtaining module, configured to obtain, in a case where the intelligent contract allows the AP node to obtain the first data of the user node, the first public key from the intelligent contract; the first public key is determined based on identification information of a target operator, wherein the target operator is an operator allowing access to data of a user node, and an intelligent contract allows the AP node to acquire the first data under the condition that the operator of the AP node is the operator allowing access to the data of the user node;
And the decryption module is used for decrypting the second data through the first public key to obtain the first data.
14. The apparatus of claim 13, wherein the apparatus comprises:
the first authentication module is used for authenticating a first access request sent by a first user node under the condition that the first access request is received;
The judging module is used for judging whether the AP node allows the first user node to access after the authentication of the first access request is passed;
The first authorization module is used for authorizing the first user node to use the spectrum communication of the AP node if the first user node is allowed to use, and distributing a second public key and a second private key for communication connection to the first user node;
And the sending module is used for sending the second private key of the first user node to the first user node and writing the second public key of the first user node into the blockchain network.
15. The apparatus of claim 14, wherein the apparatus further comprises:
the query module is used for querying a second public key of a second user node in the blockchain network under the condition that a second access request sent by the second user node is received, wherein the access request of the second user node is obtained based on the second private key of the second user node;
A second authorization module, configured to verify a second access request of the second user node based on a second public key of the second user node, and determine whether the AP node allows the second user node to access if the second access request passes the verification; and if so, authorizing the second user node to use the spectrum communication of the AP node.
16. The apparatus of claim 14, wherein the smart contract comprises a plurality of contract entries including a first private key, a first public key, whether a remaining spectrum of each AP node with which the user node subscribes to the smart contract is greater than a preset spectrum threshold; whether the balance of the user node is greater than a preset balance threshold; and signing the identification information of the operator to which each AP node of the intelligent contract belongs with the user node.
17. The apparatus of claim 16, wherein the apparatus further comprises:
An operator information obtaining module, configured to obtain, after authorizing the user node to use the spectrum communication of the AP node, identification information of a target operator, where the target operator is an operator that allows access to transmission data of the user node;
A generation module, configured to generate a first public key of the user node based on the identification information of the target operator; generating a first private key based on the first public key and identity information of the user node; the first public key and the first private key are stored in the smart contract.
18. The apparatus of claim 14, wherein the first user node is an operator node of the user node.
19. The electronic equipment is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory are communicated with each other through the communication bus;
A memory for storing a computer program;
a processor for carrying out the method steps of any one of claims 7-12 when executing a program stored on a memory.
20. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored therein a computer program which, when executed by a processor, implements the method steps of any of claims 7-12.
CN202210695453.5A 2022-06-20 2022-06-20 Intelligent spectrum sharing system, method, device, electronic equipment and storage medium Active CN114979170B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210695453.5A CN114979170B (en) 2022-06-20 2022-06-20 Intelligent spectrum sharing system, method, device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210695453.5A CN114979170B (en) 2022-06-20 2022-06-20 Intelligent spectrum sharing system, method, device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN114979170A CN114979170A (en) 2022-08-30
CN114979170B true CN114979170B (en) 2024-06-07

Family

ID=82963574

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210695453.5A Active CN114979170B (en) 2022-06-20 2022-06-20 Intelligent spectrum sharing system, method, device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114979170B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116095671B (en) * 2022-11-12 2023-12-15 山西平燕文化科技有限公司 Resource sharing method based on meta universe and related equipment thereof

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20200024738A (en) * 2018-08-28 2020-03-09 성신여자대학교 연구 산학협력단 Blockchain based spectrum sharing method and apparatus
CN112492603A (en) * 2020-11-23 2021-03-12 重庆邮电大学 Multistage dynamic spectrum sharing method based on block chain technology
CN114329619A (en) * 2021-11-16 2022-04-12 广西国信云服科技有限公司 Block chain-based spectrum resource sharing method, device and storage medium
CN114331708A (en) * 2021-11-16 2022-04-12 广西国信云服科技有限公司 Spectrum resource transaction method, system, equipment and storage medium based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20200024738A (en) * 2018-08-28 2020-03-09 성신여자대학교 연구 산학협력단 Blockchain based spectrum sharing method and apparatus
CN112492603A (en) * 2020-11-23 2021-03-12 重庆邮电大学 Multistage dynamic spectrum sharing method based on block chain technology
CN114329619A (en) * 2021-11-16 2022-04-12 广西国信云服科技有限公司 Block chain-based spectrum resource sharing method, device and storage medium
CN114331708A (en) * 2021-11-16 2022-04-12 广西国信云服科技有限公司 Spectrum resource transaction method, system, equipment and storage medium based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于区块链的6G动态频谱共享技术;刘秋妍等;移动通信;20200615;第44卷(第6期);全文 *

Also Published As

Publication number Publication date
CN114979170A (en) 2022-08-30

Similar Documents

Publication Publication Date Title
CN1874271B (en) Protection for wireless devices against false access-point attacks
US10826704B2 (en) Blockchain key storage on SIM devices
CN105516103B (en) Method, device and system for binding intelligent household electrical appliance
US7231521B2 (en) Scheme for authentication and dynamic key exchange
EP2879421B1 (en) Terminal identity verification and service authentication method, system, and terminal
CN111742531B (en) Profile information sharing
CN105471974A (en) Intelligent equipment capable of realizing remote control, terminal equipment and method
CN110545252B (en) Authentication and information protection method, terminal, control function entity and application server
US20060056634A1 (en) Apparatus, system and method for setting security information on wireless network
US20220191693A1 (en) Remote management of hardware security modules
US20090180621A1 (en) Adaptive secure authenticated channels for direct sharing of protected content between devices
CN112566119A (en) Terminal authentication method and device, computer equipment and storage medium
US20080313085A1 (en) System and method to share a guest version of rights between devices
CN114762290A (en) Method and electronic device for managing digital key
CN114979170B (en) Intelligent spectrum sharing system, method, device, electronic equipment and storage medium
US11985114B2 (en) Secure device coupling
JP2005322033A (en) Information distribution system, information distribution server, terminal appliance, information distribution method, information reception method, information processing program and storage medium
WO2021170049A1 (en) Method and apparatus for recording access behavior
CN101048971B (en) Method and system for managing authentication and payment for use of broadcast material
WO2022041151A1 (en) Device verification method, device, and cloud
US11240661B2 (en) Secure simultaneous authentication of equals anti-clogging mechanism
CN115868189A (en) Method, vehicle, terminal and system for establishing vehicle safety communication
CN110807854B (en) Unlocking strategy configuration method and equipment
KR102321405B1 (en) System and method for providing security service using blockchain and biometric information
US20090327704A1 (en) Strong authentication to a network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant