WO2023240425A1 - Security authentication management system based on blockchain big data - Google Patents
Security authentication management system based on blockchain big data Download PDFInfo
- Publication number
- WO2023240425A1 WO2023240425A1 PCT/CN2022/098523 CN2022098523W WO2023240425A1 WO 2023240425 A1 WO2023240425 A1 WO 2023240425A1 CN 2022098523 W CN2022098523 W CN 2022098523W WO 2023240425 A1 WO2023240425 A1 WO 2023240425A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- module
- data
- blockchain
- security authentication
- management system
- Prior art date
Links
- 238000012795 verification Methods 0.000 claims abstract description 33
- 238000006243 chemical reaction Methods 0.000 claims abstract description 28
- 238000004891 communication Methods 0.000 claims abstract description 16
- 238000012544 monitoring process Methods 0.000 claims description 10
- 206010000117 Abnormal behaviour Diseases 0.000 claims description 9
- 230000002159 abnormal effect Effects 0.000 claims description 8
- 238000012790 confirmation Methods 0.000 claims description 3
- 230000005856 abnormality Effects 0.000 claims description 2
- 238000001514 detection method Methods 0.000 claims description 2
- 230000002618 waking effect Effects 0.000 claims 2
- 230000009977 dual effect Effects 0.000 claims 1
- 238000010276 construction Methods 0.000 abstract 3
- 238000000034 method Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 1
- 238000003062 neural network model Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
Definitions
- certificate-based public key systems require complex certificate management processes, which will cause large computing and communication overhead.
- identity-based public key system has less computational and communication overhead, it has the disadvantage of key escrow. If the master key of the system is obtained by an attacker, the attacker can impersonate a legitimate node in the network, and the security factor is low. .
- each MPT tree storage node contains a random encryption module, which is used to implement random partial encryption of the data contained in the MPT tree storage node.
- the conversion module contains an abnormal behavior monitoring module, which is used to implement abnormal detection of the request data uploaded by the client module.
- an abnormal behavior monitoring module which is used to implement abnormal detection of the request data uploaded by the client module.
- the conversion module wakes up the GSM
- the communication module implements the sending of re-authentication text messages. The user needs to complete the corresponding operations according to the re-authentication text messages to successfully initiate the request for data.
- the key of the other backup channel is updated, and after each access, the key of the data encryption module is updated.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to the technical field of security authentication, and in particular to a security authentication management system based on blockchain big data. The system comprises a client module and a blockchain module, wherein a conversion module and a data access channel construction module are provided between the client module and the blockchain module, an encryption module is provided in each of the client module and the data access channel construction module, and an identity verification module is further provided in the conversion module; and communication between the client module and the conversion module and communication between the conversion module and the data access channel construction module are realized by means of dual-channel connection modules that are independent of each other. Security authentication is realized on the basis of blockchain big data, such that calculation and communication overheads are relatively small, and the security factor is high.
Description
本发明涉及安全认证技术领域,尤其是一种基于区块链大数据的安全认证管理***。The present invention relates to the technical field of security authentication, in particular to a security authentication management system based on blockchain big data.
目前传统的安全认证管理***普遍采用基于证书/身份的公钥体制实现,其中,基于证书的公钥体制需要复杂的证书管理过程,会造成较大的计算和通信开销。而基于身份的公钥体制虽然计算和通信开销较小,但是,具有密钥托管的缺陷,***的主密钥如果被攻击者获得,攻击者就可以假冒网络中的合法节点,安全系数较低。At present, traditional security authentication management systems are generally implemented using certificate/identity-based public key systems. Among them, certificate-based public key systems require complex certificate management processes, which will cause large computing and communication overhead. Although the identity-based public key system has less computational and communication overhead, it has the disadvantage of key escrow. If the master key of the system is obtained by an attacker, the attacker can impersonate a legitimate node in the network, and the security factor is low. .
发明内容Contents of the invention
为解决上述技术问题,本发明提供了一种基于区块链大数据的安全认证管理***,基于区块链大数据实现安全认证,计算和通信开销较小的同时,安全系数高。In order to solve the above technical problems, the present invention provides a security authentication management system based on blockchain big data, which realizes security authentication based on blockchain big data, has low computing and communication overhead, and has a high safety factor.
为解决上述技术问题,本发明所采取的技术方案如下。In order to solve the above technical problems, the technical solutions adopted by the present invention are as follows.
一种基于区块链大数据的安全认证管理***,包括客户端模块和区块链模块,客户端模块与区块链模块之间设有转换模块与数据访问通道构建模块,客户端模块和数据访问通道构建模块内各设置有一个加密模块,且转换模块中还设置有一个身份验证模块,客户端模块与转换模块之间、转换模块与数据访问通道构建模块通过相互独立的双通道连接模块实现通讯。A security authentication management system based on blockchain big data, including a client module and a blockchain module. There is a conversion module and a data access channel building module between the client module and the blockchain module. The client module and data Each access channel building module is equipped with an encryption module, and the conversion module is also equipped with an authentication module. The connection between the client module and the conversion module, and the conversion module and the data access channel building module are realized through independent dual-channel connection modules. communication.
进一步地,数据访问通道构建模块用于根据身份验证模块的验证结 果搭建不同的数据访问通道实现区块链中不同的MPT树储存节点的访问。Further, the data access channel building module is used to build different data access channels based on the verification results of the identity verification module to achieve access to different MPT tree storage nodes in the blockchain.
进一步地,每一个MPT树储存节点均内载一随机加密模块,用于实现MPT树储存节点内载数据的随机部分加密。Furthermore, each MPT tree storage node contains a random encryption module, which is used to implement random partial encryption of the data contained in the MPT tree storage node.
进一步地,每一个MPT树储存节点均内载一解密模块,用于根据身份验证模块的验证结果实现落入其访问权限内的数据的解密。Furthermore, each MPT tree storage node contains a decryption module, which is used to decrypt the data falling within its access authority based on the verification results of the identity verification module.
进一步地,所述转换模块内载一异常行为监测模块,用于实现客户端模块所上传的请求数据的异常检测,当所接收到的数据请求落入预设的异常门限时,转换模块通过唤醒GSM通讯模块实现再认证短信的发送,用户需按照再认证短信完成相应的操作,方可实现请求数据的成功发起。Furthermore, the conversion module contains an abnormal behavior monitoring module, which is used to implement abnormal detection of the request data uploaded by the client module. When the received data request falls into the preset abnormal threshold, the conversion module wakes up the GSM The communication module implements the sending of re-authentication text messages. The user needs to complete the corresponding operations according to the re-authentication text messages to successfully initiate the request for data.
进一步地,使用者通过客户端模块输入身份确认信息和请求数据,经过加密模块加密后,传送到转换模块中解密,通过身份验证模块进行身份验证,若身份验证错误,则拒绝访问;若身份验证正确,则启动异常行为监测模块实现请求数据的监测,若所接收到的数据请求落入预设的异常门限时,转换模块通过唤醒GSM通讯模块实现再认证短信的发送,用户需按照再认证短信完成相应的操作,方可实现请求数据的成功发起,请求数据的成功发起后,根据身份验证权限唤醒对应的数据访问通道构建模块,搭建对应的数据访问通道实现区块链中目标MPT树储存节点的访问。Further, the user inputs identity confirmation information and request data through the client module. After being encrypted by the encryption module, it is sent to the conversion module for decryption. The identity verification is performed through the identity verification module. If the identity verification is wrong, access is denied; if the identity verification Correct, then start the abnormal behavior monitoring module to monitor the request data. If the received data request falls into the preset abnormal threshold, the conversion module will wake up the GSM communication module to send the re-authentication SMS. The user needs to follow the re-authentication SMS Only by completing the corresponding operations can the request data be successfully initiated. After the request data is successfully initiated, the corresponding data access channel building module will be awakened according to the identity verification authority, and the corresponding data access channel will be built to realize the target MPT tree storage node in the blockchain. Access.
进一步地,在任意一个通道进行通讯时,另一个备用通道进行密钥更新,且每进行一次访问后,即进行一次数据加密模块密钥更新。Further, when any one channel communicates, the key of the other backup channel is updated, and after each access, the key of the data encryption module is updated.
进一步地,数据访问通道搭建成功后,对应MPT树储存节点的解密模块启动,根据身份验证模块的验证结果实现落入其访问权限内的数据的解密,解密完成后,即可实现对应数据的访问,完成安全认证。Furthermore, after the data access channel is successfully established, the decryption module corresponding to the MPT tree storage node is started, and the data falling within its access permissions is decrypted based on the verification results of the identity verification module. After the decryption is completed, the corresponding data can be accessed. , complete the security certification.
本发明基于区块链大数据实现安全认证,计算和通信开销较小的同时,安全系数高。The present invention realizes security authentication based on blockchain big data, with low computing and communication overhead and high safety factor.
图1是本发明一个具体实施方式的原理图。Figure 1 is a schematic diagram of a specific embodiment of the present invention.
下面结合具体实施例对本发明进行详细说明。以下实施例将有助于本领域的技术人员进一步理解本发明,但不以任何形式限制本发明。应当指出的是,对本领域的普通技术人员来说,在不脱离本发明构思的前提下,还可以做出若干变形和改进。这些都属于本发明的保护范围。The present invention will be described in detail below with reference to specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that, for those of ordinary skill in the art, several modifications and improvements can be made without departing from the concept of the present invention. These all belong to the protection scope of the present invention.
参照图1,本实施例的一种基于区块链大数据的安全认证管理***,包括客户端模块和区块链模块,客户端模块与区块链模块之间设有转换模块与数据访问通道构建模块,客户端模块和数据访问通道构建模块内各设置有一个加密模块,且转换模块中还设置有一个身份验证模块,客户端模块与转换模块之间、转换模块与数据访问通道构建模块通过相互独立的双通道连接模块实现通讯。所述数据访问通道构建模块用于根据身份验证模块的验证结果搭建不同的数据访问通道实现区块链中不同的MPT树储存节点的访问。每一个MPT树储存节点均内载一随机加密模块,用于实现MPT树储存节点内载数据的随机部分加密。且每一个MPT树储存节点均内载一解密模块,用于根据身份验证模块的验证结果实现落入其访问权限内的数据的解密。Referring to Figure 1, a security authentication management system based on blockchain big data in this embodiment includes a client module and a blockchain module. A conversion module and a data access channel are provided between the client module and the blockchain module. The building module, the client module and the data access channel building module are each equipped with an encryption module, and the conversion module is also equipped with an authentication module. Between the client module and the conversion module, the conversion module and the data access channel building module pass Independent dual-channel connection modules realize communication. The data access channel building module is used to build different data access channels based on the verification results of the identity verification module to achieve access to different MPT tree storage nodes in the blockchain. Each MPT tree storage node contains a random encryption module, which is used to implement random partial encryption of the data contained in the MPT tree storage node. Each MPT tree storage node contains a decryption module, which is used to decrypt data falling within its access rights based on the verification results of the identity verification module.
本实施例中,所述转换模块内载一异常行为监测模块,用于实现客户端模块所上传的请求数据的异常检测,当所接收到的数据请求落入预设的异常门限时,转换模块通过唤醒GSM通讯模块实现再认证短信的发送,用户需按照再认证短信完成相应的操作,方可实现请求数据的成功发起。所述异常行为监测模块基于预设的异常行为监测模型实现请求数据的异常监测,所述异常行为监测模型采用神经网络模型,基于历史异常请求数据集训练所得。In this embodiment, the conversion module contains an abnormal behavior monitoring module, which is used to detect abnormalities in the request data uploaded by the client module. When the received data request falls into the preset abnormal threshold, the conversion module passes Wake up the GSM communication module to send the re-authentication text message. The user needs to complete the corresponding operations according to the re-authentication text message to successfully initiate the request for data. The abnormal behavior monitoring module implements abnormal monitoring of request data based on a preset abnormal behavior monitoring model. The abnormal behavior monitoring model adopts a neural network model and is trained based on historical abnormal request data sets.
本具体实施使用时,使用者通过客户端模块输入身份确认信息和请求数据,经过加密模块加密后,传送到转换模块中解密,通过身份验证模块进行身份验证,若身份验证错误,则拒绝访问;若身份验证正确,则启动异常行为监测模块实现请求数据的监测,若所接收到的数据请求落入预设的异常门限时,转换模块通过唤醒GSM通讯模块实现再认证短信的发送,用户需按照再认证短信完成相应的操作,方可实现请求数据的成功发起,请求数据的成功发起后,根据身份验证权限唤醒对应的数据访问通道构建模块,搭建对应的数据访问通道实现区块链中目标MPT树储存节点的访问。数据访问通道搭建成功后,对应MPT树储存节点的解密模块启动,根据身份验证模块的验证结果实现落入其访问权限内的数据的解密,解密完成后,即可实现对应数据的访问,完成安全认证。When using this specific implementation, the user inputs identity confirmation information and request data through the client module. After being encrypted by the encryption module, it is sent to the conversion module for decryption. The identity verification is performed through the identity verification module. If the identity verification is incorrect, access is denied; If the identity verification is correct, the abnormal behavior monitoring module will be started to monitor the request data. If the received data request falls into the preset abnormal threshold, the conversion module will wake up the GSM communication module to send the re-authentication SMS. The user needs to follow Only when the re-authentication SMS completes the corresponding operation can the request data be successfully initiated. After the data request is successfully initiated, the corresponding data access channel building module will be awakened according to the identity verification authority, and the corresponding data access channel will be built to achieve the target MPT in the blockchain. Tree storage node access. After the data access channel is successfully established, the decryption module corresponding to the MPT tree storage node is started. According to the verification results of the identity verification module, the data falling within its access permissions is decrypted. After the decryption is completed, the corresponding data can be accessed, completing security. Certification.
本实施例中,在任意一个通道进行通讯时,另一个备用通道进行密钥更新,且每进行一次访问后,即进行一次数据加密模块密钥更新。In this embodiment, when any channel is communicating, the key of the other backup channel is updated, and after each access, the key of the data encryption module is updated.
以上显示和描述了本发明的基本原理和主要特征和本发明的优点。本行业的技术人员应该了解,本发明不受上述实施例的限制,上述实施例和说明书中描述的只是说明本发明的原理,在不脱离本发明精神和范围的前提下,本发明还会有各种变化和改进,这些变化和改进都落入要求保护的本发明范围内。本发明要求保护范围由所附的权利要求书及其等效物界定。The basic principles and main features of the present invention and the advantages of the present invention have been shown and described above. Those skilled in the industry should understand that the present invention is not limited by the above embodiments. The above embodiments and descriptions only illustrate the principles of the present invention. Without departing from the spirit and scope of the present invention, the present invention will also have other aspects. Various changes and modifications are possible, which fall within the scope of the claimed invention. The scope of protection of the present invention is defined by the appended claims and their equivalents.
Claims (8)
- 一种基于区块链大数据的安全认证管理***,其特征在于:包括客户端模块和区块链模块,客户端模块与区块链模块之间设有转换模块与数据访问通道构建模块,客户端模块和数据访问通道构建模块内各设置有一个加密模块,且转换模块中还设置有一个身份验证模块,客户端模块与转换模块之间、转换模块与数据访问通道构建模块通过相互独立的双通道连接模块实现通讯。A security authentication management system based on blockchain big data, which is characterized by: including a client module and a blockchain module. There is a conversion module and a data access channel building module between the client module and the blockchain module. The client There is an encryption module in the terminal module and the data access channel building module, and there is also an authentication module in the conversion module. The client module and the conversion module, the conversion module and the data access channel building module are connected through mutually independent dual The channel connection module implements communication.
- 如权利要求1所述的一种基于区块链大数据的安全认证管理***,其特征在于:数据访问通道构建模块用于根据身份验证模块的验证结果搭建不同的数据访问通道实现区块链中不同的MPT树储存节点的访问。A security authentication management system based on blockchain big data as claimed in claim 1, characterized in that: the data access channel building module is used to build different data access channels based on the verification results of the identity verification module to implement the blockchain Different MPT trees store node accesses.
- 如权利要求1所述的一种基于区块链大数据的安全认证管理***,其特征在于:每一个MPT树储存节点均内载一随机加密模块,用于实现MPT树储存节点内载数据的随机部分加密。A security authentication management system based on blockchain big data as claimed in claim 1, characterized in that each MPT tree storage node contains a random encryption module for realizing the data stored in the MPT tree storage node. Random partial encryption.
- 如权利要求2所述的一种基于区块链大数据的安全认证管理***,其特征在于:每一个MPT树储存节点均内载一解密模块,用于根据身份验证模块的验证结果实现落入其访问权限内的数据的解密。A security authentication management system based on blockchain big data as claimed in claim 2, characterized in that: each MPT tree storage node contains a decryption module for implementing the verification result of the identity verification module. Decryption of data within its access rights.
- 如权利要求1所述的一种基于区块链大数据的安全认证管理***,其特征在于:所述转换模块内载一异常行为监测模块,用于实现客户端模块所上传的请求数据的异常检测,当所接收到的数据请求落入预设的异常门限时,转换模块通过唤醒GSM通讯模块实现再认证短信的发送,用户需按照再认证短信完成相应的操作,方可实现请求数据的成功发起。A security authentication management system based on blockchain big data according to claim 1, characterized in that: the conversion module contains an abnormal behavior monitoring module for realizing abnormality of request data uploaded by the client module. Detection, when the received data request falls into the preset abnormal threshold, the conversion module realizes sending the re-authentication SMS by waking up the GSM communication module. The user needs to complete the corresponding operations according to the re-authentication SMS to successfully initiate the request for data. .
- 如权利要求1所述的一种基于区块链大数据的安全认证管理***,其特征在于:使用者通过客户端模块输入身份确认信息和请求数据,经过加密模块加密后,传送到转换模块中解密,通过身份验证模块进行身份验证,若身份验证错误,则拒绝访问;若身份验证正确,则启动异常行为监测模块实现请求数据的监测,若所接收到的数据请求落入预设的 异常门限时,转换模块通过唤醒GSM通讯模块实现再认证短信的发送,用户需按照再认证短信完成相应的操作,方可实现请求数据的成功发起,请求数据的成功发起后,根据身份验证权限唤醒对应的数据访问通道构建模块,搭建对应的数据访问通道实现区块链中目标MPT树储存节点的访问。A security authentication management system based on blockchain big data as claimed in claim 1, characterized in that: the user inputs identity confirmation information and request data through the client module, which is encrypted by the encryption module and then transmitted to the conversion module. Decrypt and authenticate through the identity verification module. If the identity verification is wrong, access will be denied; if the identity verification is correct, the abnormal behavior monitoring module will be started to monitor the requested data. If the received data request falls into the preset exception gate For a limited time, the conversion module realizes the sending of re-authentication SMS by waking up the GSM communication module. The user needs to complete the corresponding operations according to the re-authentication SMS to successfully initiate the request data. After the request data is successfully initiated, the corresponding device will be awakened according to the identity verification authority. The data access channel building module builds the corresponding data access channel to achieve access to the target MPT tree storage node in the blockchain.
- 如权利要求1所述的一种基于区块链大数据的安全认证管理***,其特征在于:在任意一个通道进行通讯时,另一个备用通道进行密钥更新,且每进行一次访问后,即进行一次数据加密模块密钥更新。A security authentication management system based on blockchain big data as claimed in claim 1, characterized in that: when any one channel communicates, another backup channel updates the key, and after each access, that is Perform a data encryption module key update.
- 如权利要求6所述的一种基于区块链大数据的安全认证管理***,其特征在于:数据访问通道搭建成功后,对应MPT树储存节点的解密模块启动,根据身份验证模块的验证结果实现落入其访问权限内的数据的解密,解密完成后,即可实现对应数据的访问,完成安全认证。A security authentication management system based on blockchain big data as claimed in claim 6, characterized in that: after the data access channel is successfully established, the decryption module corresponding to the MPT tree storage node is started, and is implemented according to the verification result of the identity verification module. Decrypt the data that falls within its access rights. After the decryption is completed, access to the corresponding data can be achieved and security authentication completed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2022/098523 WO2023240425A1 (en) | 2022-06-14 | 2022-06-14 | Security authentication management system based on blockchain big data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2022/098523 WO2023240425A1 (en) | 2022-06-14 | 2022-06-14 | Security authentication management system based on blockchain big data |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023240425A1 true WO2023240425A1 (en) | 2023-12-21 |
Family
ID=89192925
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2022/098523 WO2023240425A1 (en) | 2022-06-14 | 2022-06-14 | Security authentication management system based on blockchain big data |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2023240425A1 (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110351287A (en) * | 2019-07-17 | 2019-10-18 | 江苏南工科技集团有限公司 | A kind of mobile application security analysis method based on block chain technology |
CN111026811A (en) * | 2019-12-05 | 2020-04-17 | 姚其新 | Block chain-based medical analysis method and analysis system thereof |
US20200313856A1 (en) * | 2019-03-29 | 2020-10-01 | 0Chain, LLC | Systems and methods of blockchain platform for intermediaries and passwordless login |
CN111865998A (en) * | 2020-07-24 | 2020-10-30 | 广西科技大学 | Network security zone login method and device |
CN111970299A (en) * | 2020-08-26 | 2020-11-20 | 上海和数软件有限公司 | Block chain-based distributed Internet of things equipment identity authentication device and method |
CN112491908A (en) * | 2020-12-01 | 2021-03-12 | 阿拉拇 | Security certification management system based on block chain big data |
-
2022
- 2022-06-14 WO PCT/CN2022/098523 patent/WO2023240425A1/en unknown
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200313856A1 (en) * | 2019-03-29 | 2020-10-01 | 0Chain, LLC | Systems and methods of blockchain platform for intermediaries and passwordless login |
CN110351287A (en) * | 2019-07-17 | 2019-10-18 | 江苏南工科技集团有限公司 | A kind of mobile application security analysis method based on block chain technology |
CN111026811A (en) * | 2019-12-05 | 2020-04-17 | 姚其新 | Block chain-based medical analysis method and analysis system thereof |
CN111865998A (en) * | 2020-07-24 | 2020-10-30 | 广西科技大学 | Network security zone login method and device |
CN111970299A (en) * | 2020-08-26 | 2020-11-20 | 上海和数软件有限公司 | Block chain-based distributed Internet of things equipment identity authentication device and method |
CN112491908A (en) * | 2020-12-01 | 2021-03-12 | 阿拉拇 | Security certification management system based on block chain big data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220312208A1 (en) | Access method and system of internet of things equipment based on 5g, and storage medium | |
CA3121023C (en) | Wireless access credential system | |
CN108292250B (en) | Method and apparatus for facilitating distributed data backup | |
CN110995432B (en) | Internet of things sensing node authentication method based on edge gateway | |
JP7249821B2 (en) | Blockchain-enhanced aircraft air-ground data communication system (ACARS) communication | |
CN112954675B (en) | Multi-gateway authentication method, system, storage medium, computer device and terminal | |
WO2018214719A1 (en) | Dynamic safety method and system based on multi-fusion linked responses | |
CN112491908A (en) | Security certification management system based on block chain big data | |
CN113360925A (en) | Method and system for storing and accessing trusted data in electric power information physical system | |
CN113079132B (en) | Mass Internet of things equipment authentication method, storage medium and information data processing terminal | |
US20160315772A1 (en) | Kerberos preauthentication with j-pake | |
CN113395166B (en) | Edge computing-based power terminal cloud edge terminal collaborative security access authentication method | |
CN110635904B (en) | Remote attestation method and system for software-defined Internet of things node | |
CN105471901A (en) | Industrial information security authentication system | |
CN101282208A (en) | Method for updating safety connection incident master key as well as server and network system | |
Ahmed et al. | Anonymous key-agreement protocol for V2G environment within social Internet of Vehicles | |
EP3624394B1 (en) | Establishing a protected communication channel through a ttp | |
CN112383917A (en) | Beidou secure communication method and system based on quotient and secret algorithm | |
CN109245882A (en) | A kind of SM2 endorsement method suitable for electric power wireless sensor network | |
WO2023240425A1 (en) | Security authentication management system based on blockchain big data | |
CN102098397A (en) | Realization method of VoIP (Voice-over-IP) media stream trusted transmission based on Zimmermann Real-Time Transport Protocol key exchange | |
CN114710796A (en) | Sensor abnormity detection method, device and system based on block chain | |
CN103581191A (en) | Data safe transmitting method adapted to Internet of Things | |
WO2021022739A1 (en) | Information stream authentication system and method based on blockchain communication | |
Zhao et al. | A lightweight user authentication scheme for multi-gateway based wireless sensor networks using Rabin Cryptosystem |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22946125 Country of ref document: EP Kind code of ref document: A1 |