WO2023240425A1 - Security authentication management system based on blockchain big data - Google Patents

Security authentication management system based on blockchain big data Download PDF

Info

Publication number
WO2023240425A1
WO2023240425A1 PCT/CN2022/098523 CN2022098523W WO2023240425A1 WO 2023240425 A1 WO2023240425 A1 WO 2023240425A1 CN 2022098523 W CN2022098523 W CN 2022098523W WO 2023240425 A1 WO2023240425 A1 WO 2023240425A1
Authority
WO
WIPO (PCT)
Prior art keywords
module
data
blockchain
security authentication
management system
Prior art date
Application number
PCT/CN2022/098523
Other languages
French (fr)
Chinese (zh)
Inventor
阿拉拇
贾祺炜
Original Assignee
广州工商学院
阿拉拇
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 广州工商学院, 阿拉拇 filed Critical 广州工商学院
Priority to PCT/CN2022/098523 priority Critical patent/WO2023240425A1/en
Publication of WO2023240425A1 publication Critical patent/WO2023240425A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols

Definitions

  • certificate-based public key systems require complex certificate management processes, which will cause large computing and communication overhead.
  • identity-based public key system has less computational and communication overhead, it has the disadvantage of key escrow. If the master key of the system is obtained by an attacker, the attacker can impersonate a legitimate node in the network, and the security factor is low. .
  • each MPT tree storage node contains a random encryption module, which is used to implement random partial encryption of the data contained in the MPT tree storage node.
  • the conversion module contains an abnormal behavior monitoring module, which is used to implement abnormal detection of the request data uploaded by the client module.
  • an abnormal behavior monitoring module which is used to implement abnormal detection of the request data uploaded by the client module.
  • the conversion module wakes up the GSM
  • the communication module implements the sending of re-authentication text messages. The user needs to complete the corresponding operations according to the re-authentication text messages to successfully initiate the request for data.
  • the key of the other backup channel is updated, and after each access, the key of the data encryption module is updated.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to the technical field of security authentication, and in particular to a security authentication management system based on blockchain big data. The system comprises a client module and a blockchain module, wherein a conversion module and a data access channel construction module are provided between the client module and the blockchain module, an encryption module is provided in each of the client module and the data access channel construction module, and an identity verification module is further provided in the conversion module; and communication between the client module and the conversion module and communication between the conversion module and the data access channel construction module are realized by means of dual-channel connection modules that are independent of each other. Security authentication is realized on the basis of blockchain big data, such that calculation and communication overheads are relatively small, and the security factor is high.

Description

一种基于区块链大数据的安全认证管理***A security authentication management system based on blockchain big data 技术领域Technical field
本发明涉及安全认证技术领域,尤其是一种基于区块链大数据的安全认证管理***。The present invention relates to the technical field of security authentication, in particular to a security authentication management system based on blockchain big data.
背景技术Background technique
目前传统的安全认证管理***普遍采用基于证书/身份的公钥体制实现,其中,基于证书的公钥体制需要复杂的证书管理过程,会造成较大的计算和通信开销。而基于身份的公钥体制虽然计算和通信开销较小,但是,具有密钥托管的缺陷,***的主密钥如果被攻击者获得,攻击者就可以假冒网络中的合法节点,安全系数较低。At present, traditional security authentication management systems are generally implemented using certificate/identity-based public key systems. Among them, certificate-based public key systems require complex certificate management processes, which will cause large computing and communication overhead. Although the identity-based public key system has less computational and communication overhead, it has the disadvantage of key escrow. If the master key of the system is obtained by an attacker, the attacker can impersonate a legitimate node in the network, and the security factor is low. .
发明内容Contents of the invention
为解决上述技术问题,本发明提供了一种基于区块链大数据的安全认证管理***,基于区块链大数据实现安全认证,计算和通信开销较小的同时,安全系数高。In order to solve the above technical problems, the present invention provides a security authentication management system based on blockchain big data, which realizes security authentication based on blockchain big data, has low computing and communication overhead, and has a high safety factor.
为解决上述技术问题,本发明所采取的技术方案如下。In order to solve the above technical problems, the technical solutions adopted by the present invention are as follows.
一种基于区块链大数据的安全认证管理***,包括客户端模块和区块链模块,客户端模块与区块链模块之间设有转换模块与数据访问通道构建模块,客户端模块和数据访问通道构建模块内各设置有一个加密模块,且转换模块中还设置有一个身份验证模块,客户端模块与转换模块之间、转换模块与数据访问通道构建模块通过相互独立的双通道连接模块实现通讯。A security authentication management system based on blockchain big data, including a client module and a blockchain module. There is a conversion module and a data access channel building module between the client module and the blockchain module. The client module and data Each access channel building module is equipped with an encryption module, and the conversion module is also equipped with an authentication module. The connection between the client module and the conversion module, and the conversion module and the data access channel building module are realized through independent dual-channel connection modules. communication.
进一步地,数据访问通道构建模块用于根据身份验证模块的验证结 果搭建不同的数据访问通道实现区块链中不同的MPT树储存节点的访问。Further, the data access channel building module is used to build different data access channels based on the verification results of the identity verification module to achieve access to different MPT tree storage nodes in the blockchain.
进一步地,每一个MPT树储存节点均内载一随机加密模块,用于实现MPT树储存节点内载数据的随机部分加密。Furthermore, each MPT tree storage node contains a random encryption module, which is used to implement random partial encryption of the data contained in the MPT tree storage node.
进一步地,每一个MPT树储存节点均内载一解密模块,用于根据身份验证模块的验证结果实现落入其访问权限内的数据的解密。Furthermore, each MPT tree storage node contains a decryption module, which is used to decrypt the data falling within its access authority based on the verification results of the identity verification module.
进一步地,所述转换模块内载一异常行为监测模块,用于实现客户端模块所上传的请求数据的异常检测,当所接收到的数据请求落入预设的异常门限时,转换模块通过唤醒GSM通讯模块实现再认证短信的发送,用户需按照再认证短信完成相应的操作,方可实现请求数据的成功发起。Furthermore, the conversion module contains an abnormal behavior monitoring module, which is used to implement abnormal detection of the request data uploaded by the client module. When the received data request falls into the preset abnormal threshold, the conversion module wakes up the GSM The communication module implements the sending of re-authentication text messages. The user needs to complete the corresponding operations according to the re-authentication text messages to successfully initiate the request for data.
进一步地,使用者通过客户端模块输入身份确认信息和请求数据,经过加密模块加密后,传送到转换模块中解密,通过身份验证模块进行身份验证,若身份验证错误,则拒绝访问;若身份验证正确,则启动异常行为监测模块实现请求数据的监测,若所接收到的数据请求落入预设的异常门限时,转换模块通过唤醒GSM通讯模块实现再认证短信的发送,用户需按照再认证短信完成相应的操作,方可实现请求数据的成功发起,请求数据的成功发起后,根据身份验证权限唤醒对应的数据访问通道构建模块,搭建对应的数据访问通道实现区块链中目标MPT树储存节点的访问。Further, the user inputs identity confirmation information and request data through the client module. After being encrypted by the encryption module, it is sent to the conversion module for decryption. The identity verification is performed through the identity verification module. If the identity verification is wrong, access is denied; if the identity verification Correct, then start the abnormal behavior monitoring module to monitor the request data. If the received data request falls into the preset abnormal threshold, the conversion module will wake up the GSM communication module to send the re-authentication SMS. The user needs to follow the re-authentication SMS Only by completing the corresponding operations can the request data be successfully initiated. After the request data is successfully initiated, the corresponding data access channel building module will be awakened according to the identity verification authority, and the corresponding data access channel will be built to realize the target MPT tree storage node in the blockchain. Access.
进一步地,在任意一个通道进行通讯时,另一个备用通道进行密钥更新,且每进行一次访问后,即进行一次数据加密模块密钥更新。Further, when any one channel communicates, the key of the other backup channel is updated, and after each access, the key of the data encryption module is updated.
进一步地,数据访问通道搭建成功后,对应MPT树储存节点的解密模块启动,根据身份验证模块的验证结果实现落入其访问权限内的数据的解密,解密完成后,即可实现对应数据的访问,完成安全认证。Furthermore, after the data access channel is successfully established, the decryption module corresponding to the MPT tree storage node is started, and the data falling within its access permissions is decrypted based on the verification results of the identity verification module. After the decryption is completed, the corresponding data can be accessed. , complete the security certification.
本发明基于区块链大数据实现安全认证,计算和通信开销较小的同时,安全系数高。The present invention realizes security authentication based on blockchain big data, with low computing and communication overhead and high safety factor.
附图说明Description of the drawings
图1是本发明一个具体实施方式的原理图。Figure 1 is a schematic diagram of a specific embodiment of the present invention.
具体实施方式Detailed ways
下面结合具体实施例对本发明进行详细说明。以下实施例将有助于本领域的技术人员进一步理解本发明,但不以任何形式限制本发明。应当指出的是,对本领域的普通技术人员来说,在不脱离本发明构思的前提下,还可以做出若干变形和改进。这些都属于本发明的保护范围。The present invention will be described in detail below with reference to specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that, for those of ordinary skill in the art, several modifications and improvements can be made without departing from the concept of the present invention. These all belong to the protection scope of the present invention.
参照图1,本实施例的一种基于区块链大数据的安全认证管理***,包括客户端模块和区块链模块,客户端模块与区块链模块之间设有转换模块与数据访问通道构建模块,客户端模块和数据访问通道构建模块内各设置有一个加密模块,且转换模块中还设置有一个身份验证模块,客户端模块与转换模块之间、转换模块与数据访问通道构建模块通过相互独立的双通道连接模块实现通讯。所述数据访问通道构建模块用于根据身份验证模块的验证结果搭建不同的数据访问通道实现区块链中不同的MPT树储存节点的访问。每一个MPT树储存节点均内载一随机加密模块,用于实现MPT树储存节点内载数据的随机部分加密。且每一个MPT树储存节点均内载一解密模块,用于根据身份验证模块的验证结果实现落入其访问权限内的数据的解密。Referring to Figure 1, a security authentication management system based on blockchain big data in this embodiment includes a client module and a blockchain module. A conversion module and a data access channel are provided between the client module and the blockchain module. The building module, the client module and the data access channel building module are each equipped with an encryption module, and the conversion module is also equipped with an authentication module. Between the client module and the conversion module, the conversion module and the data access channel building module pass Independent dual-channel connection modules realize communication. The data access channel building module is used to build different data access channels based on the verification results of the identity verification module to achieve access to different MPT tree storage nodes in the blockchain. Each MPT tree storage node contains a random encryption module, which is used to implement random partial encryption of the data contained in the MPT tree storage node. Each MPT tree storage node contains a decryption module, which is used to decrypt data falling within its access rights based on the verification results of the identity verification module.
本实施例中,所述转换模块内载一异常行为监测模块,用于实现客户端模块所上传的请求数据的异常检测,当所接收到的数据请求落入预设的异常门限时,转换模块通过唤醒GSM通讯模块实现再认证短信的发送,用户需按照再认证短信完成相应的操作,方可实现请求数据的成功发起。所述异常行为监测模块基于预设的异常行为监测模型实现请求数据的异常监测,所述异常行为监测模型采用神经网络模型,基于历史异常请求数据集训练所得。In this embodiment, the conversion module contains an abnormal behavior monitoring module, which is used to detect abnormalities in the request data uploaded by the client module. When the received data request falls into the preset abnormal threshold, the conversion module passes Wake up the GSM communication module to send the re-authentication text message. The user needs to complete the corresponding operations according to the re-authentication text message to successfully initiate the request for data. The abnormal behavior monitoring module implements abnormal monitoring of request data based on a preset abnormal behavior monitoring model. The abnormal behavior monitoring model adopts a neural network model and is trained based on historical abnormal request data sets.
本具体实施使用时,使用者通过客户端模块输入身份确认信息和请求数据,经过加密模块加密后,传送到转换模块中解密,通过身份验证模块进行身份验证,若身份验证错误,则拒绝访问;若身份验证正确,则启动异常行为监测模块实现请求数据的监测,若所接收到的数据请求落入预设的异常门限时,转换模块通过唤醒GSM通讯模块实现再认证短信的发送,用户需按照再认证短信完成相应的操作,方可实现请求数据的成功发起,请求数据的成功发起后,根据身份验证权限唤醒对应的数据访问通道构建模块,搭建对应的数据访问通道实现区块链中目标MPT树储存节点的访问。数据访问通道搭建成功后,对应MPT树储存节点的解密模块启动,根据身份验证模块的验证结果实现落入其访问权限内的数据的解密,解密完成后,即可实现对应数据的访问,完成安全认证。When using this specific implementation, the user inputs identity confirmation information and request data through the client module. After being encrypted by the encryption module, it is sent to the conversion module for decryption. The identity verification is performed through the identity verification module. If the identity verification is incorrect, access is denied; If the identity verification is correct, the abnormal behavior monitoring module will be started to monitor the request data. If the received data request falls into the preset abnormal threshold, the conversion module will wake up the GSM communication module to send the re-authentication SMS. The user needs to follow Only when the re-authentication SMS completes the corresponding operation can the request data be successfully initiated. After the data request is successfully initiated, the corresponding data access channel building module will be awakened according to the identity verification authority, and the corresponding data access channel will be built to achieve the target MPT in the blockchain. Tree storage node access. After the data access channel is successfully established, the decryption module corresponding to the MPT tree storage node is started. According to the verification results of the identity verification module, the data falling within its access permissions is decrypted. After the decryption is completed, the corresponding data can be accessed, completing security. Certification.
本实施例中,在任意一个通道进行通讯时,另一个备用通道进行密钥更新,且每进行一次访问后,即进行一次数据加密模块密钥更新。In this embodiment, when any channel is communicating, the key of the other backup channel is updated, and after each access, the key of the data encryption module is updated.
以上显示和描述了本发明的基本原理和主要特征和本发明的优点。本行业的技术人员应该了解,本发明不受上述实施例的限制,上述实施例和说明书中描述的只是说明本发明的原理,在不脱离本发明精神和范围的前提下,本发明还会有各种变化和改进,这些变化和改进都落入要求保护的本发明范围内。本发明要求保护范围由所附的权利要求书及其等效物界定。The basic principles and main features of the present invention and the advantages of the present invention have been shown and described above. Those skilled in the industry should understand that the present invention is not limited by the above embodiments. The above embodiments and descriptions only illustrate the principles of the present invention. Without departing from the spirit and scope of the present invention, the present invention will also have other aspects. Various changes and modifications are possible, which fall within the scope of the claimed invention. The scope of protection of the present invention is defined by the appended claims and their equivalents.

Claims (8)

  1. 一种基于区块链大数据的安全认证管理***,其特征在于:包括客户端模块和区块链模块,客户端模块与区块链模块之间设有转换模块与数据访问通道构建模块,客户端模块和数据访问通道构建模块内各设置有一个加密模块,且转换模块中还设置有一个身份验证模块,客户端模块与转换模块之间、转换模块与数据访问通道构建模块通过相互独立的双通道连接模块实现通讯。A security authentication management system based on blockchain big data, which is characterized by: including a client module and a blockchain module. There is a conversion module and a data access channel building module between the client module and the blockchain module. The client There is an encryption module in the terminal module and the data access channel building module, and there is also an authentication module in the conversion module. The client module and the conversion module, the conversion module and the data access channel building module are connected through mutually independent dual The channel connection module implements communication.
  2. 如权利要求1所述的一种基于区块链大数据的安全认证管理***,其特征在于:数据访问通道构建模块用于根据身份验证模块的验证结果搭建不同的数据访问通道实现区块链中不同的MPT树储存节点的访问。A security authentication management system based on blockchain big data as claimed in claim 1, characterized in that: the data access channel building module is used to build different data access channels based on the verification results of the identity verification module to implement the blockchain Different MPT trees store node accesses.
  3. 如权利要求1所述的一种基于区块链大数据的安全认证管理***,其特征在于:每一个MPT树储存节点均内载一随机加密模块,用于实现MPT树储存节点内载数据的随机部分加密。A security authentication management system based on blockchain big data as claimed in claim 1, characterized in that each MPT tree storage node contains a random encryption module for realizing the data stored in the MPT tree storage node. Random partial encryption.
  4. 如权利要求2所述的一种基于区块链大数据的安全认证管理***,其特征在于:每一个MPT树储存节点均内载一解密模块,用于根据身份验证模块的验证结果实现落入其访问权限内的数据的解密。A security authentication management system based on blockchain big data as claimed in claim 2, characterized in that: each MPT tree storage node contains a decryption module for implementing the verification result of the identity verification module. Decryption of data within its access rights.
  5. 如权利要求1所述的一种基于区块链大数据的安全认证管理***,其特征在于:所述转换模块内载一异常行为监测模块,用于实现客户端模块所上传的请求数据的异常检测,当所接收到的数据请求落入预设的异常门限时,转换模块通过唤醒GSM通讯模块实现再认证短信的发送,用户需按照再认证短信完成相应的操作,方可实现请求数据的成功发起。A security authentication management system based on blockchain big data according to claim 1, characterized in that: the conversion module contains an abnormal behavior monitoring module for realizing abnormality of request data uploaded by the client module. Detection, when the received data request falls into the preset abnormal threshold, the conversion module realizes sending the re-authentication SMS by waking up the GSM communication module. The user needs to complete the corresponding operations according to the re-authentication SMS to successfully initiate the request for data. .
  6. 如权利要求1所述的一种基于区块链大数据的安全认证管理***,其特征在于:使用者通过客户端模块输入身份确认信息和请求数据,经过加密模块加密后,传送到转换模块中解密,通过身份验证模块进行身份验证,若身份验证错误,则拒绝访问;若身份验证正确,则启动异常行为监测模块实现请求数据的监测,若所接收到的数据请求落入预设的 异常门限时,转换模块通过唤醒GSM通讯模块实现再认证短信的发送,用户需按照再认证短信完成相应的操作,方可实现请求数据的成功发起,请求数据的成功发起后,根据身份验证权限唤醒对应的数据访问通道构建模块,搭建对应的数据访问通道实现区块链中目标MPT树储存节点的访问。A security authentication management system based on blockchain big data as claimed in claim 1, characterized in that: the user inputs identity confirmation information and request data through the client module, which is encrypted by the encryption module and then transmitted to the conversion module. Decrypt and authenticate through the identity verification module. If the identity verification is wrong, access will be denied; if the identity verification is correct, the abnormal behavior monitoring module will be started to monitor the requested data. If the received data request falls into the preset exception gate For a limited time, the conversion module realizes the sending of re-authentication SMS by waking up the GSM communication module. The user needs to complete the corresponding operations according to the re-authentication SMS to successfully initiate the request data. After the request data is successfully initiated, the corresponding device will be awakened according to the identity verification authority. The data access channel building module builds the corresponding data access channel to achieve access to the target MPT tree storage node in the blockchain.
  7. 如权利要求1所述的一种基于区块链大数据的安全认证管理***,其特征在于:在任意一个通道进行通讯时,另一个备用通道进行密钥更新,且每进行一次访问后,即进行一次数据加密模块密钥更新。A security authentication management system based on blockchain big data as claimed in claim 1, characterized in that: when any one channel communicates, another backup channel updates the key, and after each access, that is Perform a data encryption module key update.
  8. 如权利要求6所述的一种基于区块链大数据的安全认证管理***,其特征在于:数据访问通道搭建成功后,对应MPT树储存节点的解密模块启动,根据身份验证模块的验证结果实现落入其访问权限内的数据的解密,解密完成后,即可实现对应数据的访问,完成安全认证。A security authentication management system based on blockchain big data as claimed in claim 6, characterized in that: after the data access channel is successfully established, the decryption module corresponding to the MPT tree storage node is started, and is implemented according to the verification result of the identity verification module. Decrypt the data that falls within its access rights. After the decryption is completed, access to the corresponding data can be achieved and security authentication completed.
PCT/CN2022/098523 2022-06-14 2022-06-14 Security authentication management system based on blockchain big data WO2023240425A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/098523 WO2023240425A1 (en) 2022-06-14 2022-06-14 Security authentication management system based on blockchain big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/098523 WO2023240425A1 (en) 2022-06-14 2022-06-14 Security authentication management system based on blockchain big data

Publications (1)

Publication Number Publication Date
WO2023240425A1 true WO2023240425A1 (en) 2023-12-21

Family

ID=89192925

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/098523 WO2023240425A1 (en) 2022-06-14 2022-06-14 Security authentication management system based on blockchain big data

Country Status (1)

Country Link
WO (1) WO2023240425A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110351287A (en) * 2019-07-17 2019-10-18 江苏南工科技集团有限公司 A kind of mobile application security analysis method based on block chain technology
CN111026811A (en) * 2019-12-05 2020-04-17 姚其新 Block chain-based medical analysis method and analysis system thereof
US20200313856A1 (en) * 2019-03-29 2020-10-01 0Chain, LLC Systems and methods of blockchain platform for intermediaries and passwordless login
CN111865998A (en) * 2020-07-24 2020-10-30 广西科技大学 Network security zone login method and device
CN111970299A (en) * 2020-08-26 2020-11-20 上海和数软件有限公司 Block chain-based distributed Internet of things equipment identity authentication device and method
CN112491908A (en) * 2020-12-01 2021-03-12 阿拉拇 Security certification management system based on block chain big data

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200313856A1 (en) * 2019-03-29 2020-10-01 0Chain, LLC Systems and methods of blockchain platform for intermediaries and passwordless login
CN110351287A (en) * 2019-07-17 2019-10-18 江苏南工科技集团有限公司 A kind of mobile application security analysis method based on block chain technology
CN111026811A (en) * 2019-12-05 2020-04-17 姚其新 Block chain-based medical analysis method and analysis system thereof
CN111865998A (en) * 2020-07-24 2020-10-30 广西科技大学 Network security zone login method and device
CN111970299A (en) * 2020-08-26 2020-11-20 上海和数软件有限公司 Block chain-based distributed Internet of things equipment identity authentication device and method
CN112491908A (en) * 2020-12-01 2021-03-12 阿拉拇 Security certification management system based on block chain big data

Similar Documents

Publication Publication Date Title
US20220312208A1 (en) Access method and system of internet of things equipment based on 5g, and storage medium
CA3121023C (en) Wireless access credential system
CN108292250B (en) Method and apparatus for facilitating distributed data backup
CN110995432B (en) Internet of things sensing node authentication method based on edge gateway
JP7249821B2 (en) Blockchain-enhanced aircraft air-ground data communication system (ACARS) communication
CN112954675B (en) Multi-gateway authentication method, system, storage medium, computer device and terminal
WO2018214719A1 (en) Dynamic safety method and system based on multi-fusion linked responses
CN112491908A (en) Security certification management system based on block chain big data
CN113360925A (en) Method and system for storing and accessing trusted data in electric power information physical system
CN113079132B (en) Mass Internet of things equipment authentication method, storage medium and information data processing terminal
US20160315772A1 (en) Kerberos preauthentication with j-pake
CN113395166B (en) Edge computing-based power terminal cloud edge terminal collaborative security access authentication method
CN110635904B (en) Remote attestation method and system for software-defined Internet of things node
CN105471901A (en) Industrial information security authentication system
CN101282208A (en) Method for updating safety connection incident master key as well as server and network system
Ahmed et al. Anonymous key-agreement protocol for V2G environment within social Internet of Vehicles
EP3624394B1 (en) Establishing a protected communication channel through a ttp
CN112383917A (en) Beidou secure communication method and system based on quotient and secret algorithm
CN109245882A (en) A kind of SM2 endorsement method suitable for electric power wireless sensor network
WO2023240425A1 (en) Security authentication management system based on blockchain big data
CN102098397A (en) Realization method of VoIP (Voice-over-IP) media stream trusted transmission based on Zimmermann Real-Time Transport Protocol key exchange
CN114710796A (en) Sensor abnormity detection method, device and system based on block chain
CN103581191A (en) Data safe transmitting method adapted to Internet of Things
WO2021022739A1 (en) Information stream authentication system and method based on blockchain communication
Zhao et al. A lightweight user authentication scheme for multi-gateway based wireless sensor networks using Rabin Cryptosystem

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22946125

Country of ref document: EP

Kind code of ref document: A1