首页>
外国专利>
METHOD FOR CERTIFICATING IoT DEVICE AND VERIFYING INTEGRITY OF IoT DEVICE, AND CONTROL DEVICE USING THEM
METHOD FOR CERTIFICATING IoT DEVICE AND VERIFYING INTEGRITY OF IoT DEVICE, AND CONTROL DEVICE USING THEM
展开▼
机译:用于证书IoT设备的方法和验证IoT设备的完整性,以及使用它们的控制设备
展开▼
页面导航
摘要
著录项
相似文献
摘要
The present invention provides a method for authenticating an Internet of Things (IoT) device and verifying the integrity of the IoT device, (a) a group key corresponding to a group including the control device and the IoT device, and n - the n an integer greater than or equal to 1 - public keys - the n public keys are generated by repeating a hash operation using at least control device information and IoT device information as a seed - to generate at least one of the group key and the n public keys kth - the k is an integer between 1 and n - store a public key in the control device, store the group key and at least a (k+1)th public key in the IoT device, and cause the IoT device to IoT device behavior information, the (k+1)th public key, and authentication information - The authentication information is a (k+2)th public key generated by hashing the (k+1)th public key, the IoT device Registers an authentication transaction including - generated by referring to the group key stored in and the IoT device behavior information - to a blockchain network, a timestamp, the (k+1) th public key, and verification information - the The verification information is generated by referring to the (k+2)th public key and the IoT device detailed information value, and the IoT device detailed information value is a detailed information hash value obtained by hashing at least one IoT device detailed information, the time In a state in which a verification transaction including a stamp, the group key stored in the IoT device, and IoT device identification information is registered in the blockchain network, for authenticating the IoT device or verifying the integrity of the IoT device When a triggering condition is satisfied, the control device acquires the authentication transaction from the blockchain network, or acquires the IoT device identification information and the at least one IoT device detailed information from the IoT device, and obtains theobtaining a verification transaction; and (b), by the control device, (i) obtaining the IoT device behavior information, the (k+1)th public key, and the authentication information from the authentication transaction, and obtaining the (kth)th from the authentication transaction +1) hashing the public key to generate a first comparison target (k+2)th public key, the group key stored in the control device, the first comparison target (k+2)th public key, and the a process of generating comparison target authentication information by referring to the IoT device behavior information obtained from an authentication transaction, and authenticating the IoT device by comparing the comparison target authentication information with the authentication information obtained from the authentication transaction; or (ii) ) Obtaining the (k+1)th public key, the timestamp, and the verification information from the verification transaction, and hashing the at least one IoT device detailed information obtained from the IoT device to hash the comparison target detailed information Comparison target IoT that generates a value and includes the comparison target detailed information hash value, the IoT device identification information acquired from the IoT device, the timestamp acquired from the verification transaction, and the group key stored in the control device A device detail information value is generated, and the (k+1)th public key obtained from the verification transaction is hashed to generate a second comparison target (k+2)th public key, and the second comparison target (k+2)th public key is generated. k+2) Generate comparison target verification information by referring to the public key and the comparison target IoT device detailed information value, and compare the comparison target verification information with the verification information obtained from the verification transaction to determine the integrity of the IoT device performing a verification process; It relates to a method comprising
展开▼