首页> 外国专利> METHOD FOR CERTIFICATING IoT DEVICE AND VERIFYING INTEGRITY OF IoT DEVICE, AND CONTROL DEVICE USING THEM

METHOD FOR CERTIFICATING IoT DEVICE AND VERIFYING INTEGRITY OF IoT DEVICE, AND CONTROL DEVICE USING THEM

机译:用于证书IoT设备的方法和验证IoT设备的完整性,以及使用它们的控制设备

摘要

The present invention provides a method for authenticating an Internet of Things (IoT) device and verifying the integrity of the IoT device, (a) a group key corresponding to a group including the control device and the IoT device, and n - the n an integer greater than or equal to 1 - public keys - the n public keys are generated by repeating a hash operation using at least control device information and IoT device information as a seed - to generate at least one of the group key and the n public keys kth - the k is an integer between 1 and n - store a public key in the control device, store the group key and at least a (k+1)th public key in the IoT device, and cause the IoT device to IoT device behavior information, the (k+1)th public key, and authentication information - The authentication information is a (k+2)th public key generated by hashing the (k+1)th public key, the IoT device Registers an authentication transaction including - generated by referring to the group key stored in and the IoT device behavior information - to a blockchain network, a timestamp, the (k+1) th public key, and verification information - the The verification information is generated by referring to the (k+2)th public key and the IoT device detailed information value, and the IoT device detailed information value is a detailed information hash value obtained by hashing at least one IoT device detailed information, the time In a state in which a verification transaction including a stamp, the group key stored in the IoT device, and IoT device identification information is registered in the blockchain network, for authenticating the IoT device or verifying the integrity of the IoT device When a triggering condition is satisfied, the control device acquires the authentication transaction from the blockchain network, or acquires the IoT device identification information and the at least one IoT device detailed information from the IoT device, and obtains theobtaining a verification transaction; and (b), by the control device, (i) obtaining the IoT device behavior information, the (k+1)th public key, and the authentication information from the authentication transaction, and obtaining the (kth)th from the authentication transaction +1) hashing the public key to generate a first comparison target (k+2)th public key, the group key stored in the control device, the first comparison target (k+2)th public key, and the a process of generating comparison target authentication information by referring to the IoT device behavior information obtained from an authentication transaction, and authenticating the IoT device by comparing the comparison target authentication information with the authentication information obtained from the authentication transaction; or (ii) ) Obtaining the (k+1)th public key, the timestamp, and the verification information from the verification transaction, and hashing the at least one IoT device detailed information obtained from the IoT device to hash the comparison target detailed information Comparison target IoT that generates a value and includes the comparison target detailed information hash value, the IoT device identification information acquired from the IoT device, the timestamp acquired from the verification transaction, and the group key stored in the control device A device detail information value is generated, and the (k+1)th public key obtained from the verification transaction is hashed to generate a second comparison target (k+2)th public key, and the second comparison target (k+2)th public key is generated. k+2) Generate comparison target verification information by referring to the public key and the comparison target IoT device detailed information value, and compare the comparison target verification information with the verification information obtained from the verification transaction to determine the integrity of the IoT device performing a verification process; It relates to a method comprising
机译:本发明提供了一种用于认证物联网(物联网)设备的方法并验证物联网设备的完整性,(a)对应于包括控制设备和物联网设备的组的组密钥,以及n - n大于或等于1 - 公钥 - n公钥 - 通过使用至少控制设备信息和物联网设备信息作为种子来重复散列操作来生成n公钥 - 以生成组密钥和n公钥中的至少一个kth - k是1和n之间的整数 - 在控制设备中存储一个公钥,将组键和至少一个(k + 1)个公钥存储在IoT设备中,并导致物联网设备到IoT设备行为信息,(k + 1)th公钥和身份验证信息 - 认证信息是由散列(k + 1)th公钥生成的a(k + 2)th公钥,IoT设备注册身份验证事务包括 - 引用存储在内的组密钥生成和IoT设备行为信息 - 到区块链网络,时间戳,(k + 1)个公钥和验证信息 - 通过参考(k + 2)Th公钥和物联网来生成验证信息设备详细信息值,并且物联网设备详细信息值是通过散列至少一个物联网设备的详细信息,该散列的详细信息散列值,其中验证事务包括标记的验证事务,存储在IOT中的组密钥的状态设备和物联网设备识别信息在区块网络中登记,用于认证物联网设备或验证当满足触发条件时的IOT设备的完整性,控制设备从区块链网络获取认证事务,或获取物联网设备识别信息和至少一个IOT设备来自物联网设备的详细信息,并获取传统验证交易离子; (b),通过控制设备,(i)从认证事务获取IoT设备行为信息,(k + 1)个公钥和认证信息,并从认证事务中获取(kth)th +1)散列公钥生成第一个比较目标(k + 2)Th公钥,存储在控制设备中的组密钥,第一个比较目标(k + 2)Th公钥,以及生成的过程比较目标认证信息通过参考从认证事务获得的物联网设备行为信息,并通过将比较目标认证信息与从认证事务获得的认证信息进行比较来认证物联网设备;或(ii))从验证事务获取(k + 1)个公钥,时间戳和验证信息,并散列从物联网设备获得的至少一个物联网设备详细信息,以散列比较目标详细信息比较目标IOT,其生成值并且包括比较目标详细信息哈希值,从IOT设备获取的物联网设备识别信息,从验证事务获取的时间戳,以及存储在控制设备中的组密钥的设备详细信息值生成,并且从验证事务获得的(k + 1)个公钥被哈希以生成第二个比较目标(k + 2)个公钥,并且生成第二个比较目标(k + 2)公钥。 K + 2)通过参考公钥和比较目标物联网设备的详细信息值来生成比较目标验证信息,并将比较目标验证信息与从验证事务获得的验证信息进行比较以确定IOT设备的完整性验证过程;它涉及一种包括的方法

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号