[go: up one dir, main page]

CN110190971B - 一种基于区块链的jwt令牌认证方法 - Google Patents

一种基于区块链的jwt令牌认证方法 Download PDF

Info

Publication number
CN110190971B
CN110190971B CN201910564982.XA CN201910564982A CN110190971B CN 110190971 B CN110190971 B CN 110190971B CN 201910564982 A CN201910564982 A CN 201910564982A CN 110190971 B CN110190971 B CN 110190971B
Authority
CN
China
Prior art keywords
verification code
token
jwt
verification
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910564982.XA
Other languages
English (en)
Other versions
CN110190971A (zh
Inventor
杨海勇
庞松涛
商广勇
王伟兵
马岩堂
赵树林
姜鑫
陶鑫
刘伟巍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chaozhou Zhuoshu Big Data Industry Development Co Ltd
Original Assignee
Chaozhou Zhuoshu Big Data Industry Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chaozhou Zhuoshu Big Data Industry Development Co Ltd filed Critical Chaozhou Zhuoshu Big Data Industry Development Co Ltd
Priority to CN201910564982.XA priority Critical patent/CN110190971B/zh
Publication of CN110190971A publication Critical patent/CN110190971A/zh
Application granted granted Critical
Publication of CN110190971B publication Critical patent/CN110190971B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

本发明提供一种基于区块链的JWT令牌认证方法,属于JWT令牌认证技术领域,本发明分为1)验证码获取、2)验证码写链和3)JWT令牌发放三个步骤,使用区块链技术,结合JWT开放标准协议,为区块链用户提供JWT令牌发放和验证,提高令牌认证系统的安全性、可信任性和可追溯性。

Description

一种基于区块链的JWT令牌认证方法
技术领域
本发明涉及JWT令牌认证技术,尤其涉及一种基于区块链的JWT令牌认证方法。
背景技术
在一个互联的移动世界中,对用户身份进行保护以免受身份盗窃和欺诈的需求非常强烈。
如今,从可穿戴设备、相机、家用电子产品以及户门,再到汽车和医疗设备等,一切都已互联起来,并且这种互联将会更深入地加速,尤其是随着5G进入市场,我们将看到更多智能的互联设备——所有这些设备都具有相互通信和交换数据的功能。
由此,我们的身边围绕各种互联设备服务于我们的日常生活,这些技术给我们带来了成倍成倍的便利。
但是,往往当新技术得到广泛应用时,恶意攻击的机会也不可避免地会增加,因此我们也需要不断改进网络安全。
在一个迅速变化的数字世界中,方便,往往是用户的最大期待,而不是被视为“锦上添花”。
这意味着用户身份的安全管理,不仅是我们一大担忧,更是一项重大挑战。
JWT(JSON Web Token)是一个基于JSON的开放标准(RFC7519),定义了一种紧凑的、自包含的方式,又因为它是经过数字签名的,所以常作为网络应用中身份提供者和服务提供者之间的用户身份凭据。区块链技术具有不可篡改、可追溯的特性,结合JWT标准协议,搭建一套可信任的令牌认证体系。
发明内容
根据以上的内容,本发明提出了一种基于区块链的JWT令牌认证方法,旨在提高令牌认证系统的安全性、可信任性和可追溯性。
本发明的技术方案是:
一种基于区块链的JWT令牌认证方法,
实现过程分为三步:
1)验证码获取:JWT令牌服务接收验证码获取请求后,查询区块链的当前区块高度,将当前区块高度和当前时间戳作为随机种子,生成不可预测的随机码;
2)验证码写链:用户在区块链客户端签署验证码写链交易,然后提交写链交易到区块链,用于令牌发放时的验证;
3)JWT令牌发放:由JWT令牌服务生成JWT令牌时,将验证码也写入到令牌,由令牌服务发起验证码校验区块链交易,由令牌认证智能合约进行验证码与用户的验证,验证通过,则将验证码与JWT令牌的关系写入区块链,然后由令牌服务将JWT令牌发放给用户,若验证失败,则不写链。
总体分为五个部分,1)搭建区块链网络,2)部署JWT令牌服务,3)JWT令牌申请,4)JWT令牌验证。
进一步的,
1)搭建区块链网络
使用Hyperledger Fabric框架搭建区块链网络,为智能合约提供运行时环境;然后部署令牌认证智能合约,实现验证码校验和写链功能。
进一步的,
2)部署JWT令牌服务
部署JWT令牌服务,实现JWT令牌的发放、以及验证码请求的接收和检查业务。
进一步的,
3)JWT令牌申请
首先,用户向JWT令牌服务发送获取验证码的请求,JWT令牌服务生成随机验证码并返回给用户;
接下来,用户使用区块链客户端签署验证码上链交易,并发送到区块链网络,区块链网络接收到交易请求后,将验证码写入区块链;
验证码写链成功后,用户使用验证码向JWT令牌服务发送令牌获取请求,JWT令牌服务接收到请求后,首先利用JWT的HS256加密类型生成JWT令牌,令牌签名使用统一秘钥,然后将令牌和验证码作为参数调用区块链的令牌认证智能合约发起验证码校验请求;
最后,JWT令牌服务根据验证码校验结果,判断是否将JWT令牌返回给用户。
再进一步的,
所述验证码校验,即智能合约将查询该验证码的写链交易,比较验证码写链交易的签名公钥与验证码校验交易的签名公钥是否一致:若不一致,则验证失败;若一致,则验证通过,并将该JWT令牌和验证码的关联关系进行写链操作。
进一步的,
4)JWT令牌验证
用户发送令牌验证请求到JWT令牌服务,JWT令牌服务使用签名令牌的统一秘钥进行验签操作,并返回验签结果。
本发明的有益效果是
1)可信任
基于区块链技术,每次令牌发放交易均由用户私钥签署上链交易,具有不可否认行。
2)可追溯
基于区块链技术,具有不可篡改特性,令牌发放交易历史不可删除和更改。
附图说明
图1是本发明的JWT令牌发放示意图。
具体实施方式
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例,基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动的前提下所获得的所有其他实施例,都属于本发明保护的范围。
本发明的一种基于区块链的JWT令牌认证方,其技术实现方案如下:
1)搭建区块链网络
使用Hyperledger Fabric框架搭建区块链网络,为智能合约提供运行时环境;然后部署令牌认证智能合约,实现验证码校验和写链功能。
2)部署JWT令牌服务
部署JWT令牌服务,实现JWT令牌的发放、以及验证码请求的接收和检查业务。
3)JWT令牌申请
首先,用户向JWT令牌服务发送获取验证码的请求,JWT令牌服务生成随机验证码并返回给用户;
接下来,用户使用区块链客户端签署验证码上链交易,并发送到区块链网络,区块链网络接收到交易请求后,将验证码写入区块链;
验证码写链成功后,用户使用验证码向JWT令牌服务发送令牌获取请求。
JWT令牌服务接收到请求后,首先利用JWT的HS256加密类型生成JWT令牌,令牌签名使用统一秘钥,然后将令牌和验证码作为参数调用区块链的令牌认证智能合约发起验证码校验请求;
智能合约将查询该验证码的写链交易,比较验证码写链交易的签名公钥与验证码校验交易的签名公钥是否一致:
若不一致,则验证失败;若一致,则验证通过,并将该JWT令牌和验证码的关联关系进行写链操作;
最后,JWT令牌服务根据验证码校验结果,判断是否将JWT令牌返回给用户。
4)JWT令牌验证
用户发送令牌验证请求到JWT令牌服务,JWT令牌服务使用签名令牌的统一秘钥进行验签操作,并返回验签结果。
以上所述仅为本发明的较佳实施例,仅用于说明本发明的技术方案,并非用于限定本发明的保护范围。凡在本发明的精神和原则之内所做的任何修改、等同替换、改进等,均包含在本发明的保护范围内。

Claims (6)

1.一种基于区块链的JWT令牌认证方法,其特征在于,
实现过程分为三步:
1)验证码获取:JWT令牌服务接收验证码获取请求后,查询区块链的当前区块高度,将当前区块高度和当前时间戳作为随机种子,生成不可预测的随机码;
2)验证码写链:用户在区块链客户端签署验证码写链交易,然后提交写链交易到区块链,用于令牌发放时的验证;
3)JWT令牌发放:由JWT令牌服务生成JWT令牌时,将验证码也写入到令牌,由令牌服务发起验证码校验区块链交易,由令牌认证智能合约进行验证码与用户的验证,验证通过,则将验证码与JWT令牌的关系写入区块链,然后由令牌服务将JWT令牌发放给用户,若验证失败,则不写链;
具体的,
首先,用户向JWT令牌服务发送获取验证码的请求,JWT令牌服务生成随机验证码并返回给用户;
接下来,用户使用区块链客户端签署验证码上链交易,并发送到区块链网络,区块链网络接收到交易请求后,将验证码写入区块链;
验证码写链成功后,用户使用验证码向JWT令牌服务发送令牌获取请求;
最后,JWT令牌服务根据验证码校验结果,判断是否将JWT令牌返回给用户;
所述验证码校验,即智能合约将查询该验证码的写链交易,比较验证码写链交易的签名公钥与验证码校验交易的签名公钥是否一致:若不一致,则验证失败;若一致,则验证通过,并将该JWT令牌和验证码的关联关系进行写链操作。
2.根据权利要求1所述的方法,其特征在于,
总体分为五个部分,1)搭建区块链网络,2)部署JWT令牌服务,3)JWT令牌申请,4)JWT令牌验证。
3.根据权利要求2所述的方法,其特征在于,
1)搭建区块链网络
使用Hyperledger Fabric框架搭建区块链网络,为智能合约提供运行时环境;然后部署令牌认证智能合约,实现验证码校验和写链功能。
4.根据权利要求2所述的方法,其特征在于,
2)部署JWT令牌服务
部署JWT令牌服务,实现JWT令牌的发放、以及验证码请求的接收和检查业务。
5.根据权利要求1所述的方法,其特征在于,
JWT令牌服务接收到请求后,首先利用JWT的HS256加密类型生成JWT令牌,令牌签名使用统一秘钥,然后将令牌和验证码作为参数调用区块链的令牌认证智能合约发起验证码校验请求。
6.根据权利要求2所述的方法,其特征在于,
4)JWT令牌验证
用户发送令牌验证请求到JWT令牌服务,JWT令牌服务使用签名令牌的统一秘钥进行验签操作,并返回验签结果。
CN201910564982.XA 2019-06-27 2019-06-27 一种基于区块链的jwt令牌认证方法 Active CN110190971B (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910564982.XA CN110190971B (zh) 2019-06-27 2019-06-27 一种基于区块链的jwt令牌认证方法

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910564982.XA CN110190971B (zh) 2019-06-27 2019-06-27 一种基于区块链的jwt令牌认证方法

Publications (2)

Publication Number Publication Date
CN110190971A CN110190971A (zh) 2019-08-30
CN110190971B true CN110190971B (zh) 2022-03-15

Family

ID=67723666

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910564982.XA Active CN110190971B (zh) 2019-06-27 2019-06-27 一种基于区块链的jwt令牌认证方法

Country Status (1)

Country Link
CN (1) CN110190971B (zh)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111625800A (zh) * 2020-06-05 2020-09-04 光载互联(杭州)科技有限公司 一种基于活体检测的数字身份认证方法及系统
CN112632164B (zh) * 2020-12-21 2022-09-13 杭州云象网络技术有限公司 一种实现可信权限访问的通用跨链编程接口方法
CN112277881B (zh) * 2020-12-25 2021-04-06 上海银基信息安全技术股份有限公司 一种身份认证方法及装置、车辆、用户设备
CN113452677A (zh) * 2021-05-28 2021-09-28 济南浪潮数据技术有限公司 一种请求处理方法、系统、设备以及介质
CN114266574A (zh) * 2021-09-30 2022-04-01 西南电子技术研究所(中国电子科技集团公司第十研究所) 一种基于区块链平台的各业务系统间权限校验方法
CN114944947B (zh) * 2022-05-13 2023-07-28 平安科技(深圳)有限公司 客户端的权限认证方法、装置、设备及存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833081A (zh) * 2018-06-22 2018-11-16 中国人民解放军国防科技大学 一种基于区块链的设备组网认证方法
WO2019013773A1 (en) * 2017-07-10 2019-01-17 Intuit Inc. SECURED TOKEN THROUGH BLOCK CHAINS
AU2019202395A1 (en) * 2016-09-15 2019-05-02 Accenture Global Solutions Limited Method and system for secure communication of a token and aggregation of the same

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107306183B (zh) * 2016-04-22 2021-12-21 索尼公司 客户端、服务端、方法和身份验证系统
US10255342B2 (en) * 2017-04-12 2019-04-09 Vijay K. Madisetti Method and system for tuning blockchain scalability, decentralization, and security for fast and low-cost payment and transaction processing
EP3596880B1 (en) * 2017-04-18 2022-06-01 Samsung Electronics Co., Ltd. Method and apparatus for access control in distributed blockchain-based internet of things (iot) network
US10642967B2 (en) * 2017-11-28 2020-05-05 American Express Travel Related Services Company, Inc. Single sign-on solution using blockchain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2019202395A1 (en) * 2016-09-15 2019-05-02 Accenture Global Solutions Limited Method and system for secure communication of a token and aggregation of the same
WO2019013773A1 (en) * 2017-07-10 2019-01-17 Intuit Inc. SECURED TOKEN THROUGH BLOCK CHAINS
CN108833081A (zh) * 2018-06-22 2018-11-16 中国人民解放军国防科技大学 一种基于区块链的设备组网认证方法

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
"Document Certification Through the Blockchain";martin stellnberger;《https://www.martinstellnberger.co/document-certification-through-the-blockchain》;20161205;全文 *
"JWT令牌:轻量级基于令牌的身份验证";企鹅号-爱码农;《https://cloud.tencent.com/developer/news/406226》;20190608;全文 *
"Personal cloud interoperability";Jose G. Faisca;《2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)》;20160728;全文 *
NJaho ."基于token的鉴权机制 — JWT介绍".《https://www.cnblogs.com/Jaho/p/9275986.html》.2018, *

Also Published As

Publication number Publication date
CN110190971A (zh) 2019-08-30

Similar Documents

Publication Publication Date Title
CN110190971B (zh) 一种基于区块链的jwt令牌认证方法
CN111429254B (zh) 一种业务数据处理方法、设备以及可读存储介质
CN112039909B (zh) 基于统一网关的认证鉴权方法、装置、设备及存储介质
CN108012268B (zh) 一种保证应用软件在手机终端上安全使用的sim卡
CN113301022B (zh) 基于区块链和雾计算的物联网设备身份安全认证方法
US20190281028A1 (en) System and method for decentralized authentication using a distributed transaction-based state machine
US8112787B2 (en) System and method for securing a credential via user and server verification
Hammood et al. A review of user authentication model for online banking system based on mobile IMEI number
US6073237A (en) Tamper resistant method and apparatus
CN111027035B (zh) 一种基于区块链的多重身份认证方法及系统
CN105357186B (zh) 一种基于带外验证和增强otp机制的二次认证方法
CN1799018A (zh) 基于接近令牌单元对应用服务的安全访问
CN103269270A (zh) 一种基于手机号码的实名认证安全登录的方法及系统
JPH10336169A (ja) 認証方法、認証装置、記憶媒体、認証サーバ及び認証端末装置
CN101257489A (zh) 一种保护账号安全的方法
CN109039652B (zh) 一种数字通证的生成及应用方法
CN103747036A (zh) 一种桌面虚拟化环境下的可信安全增强方法
KR20190114434A (ko) 블록체인 기반의 권한 인증 방법, 단말 및 이를 이용한 서버
CN104063650B (zh) 一种密钥存储设备及其使用方法
KR20140098872A (ko) 모바일 nfc단말기 웹 서비스를 위한 바이오인식과 tsm 기반의 보안 시스템 및 방법
CN112765626A (zh) 基于托管密钥授权签名方法、装置、系统及存储介质
KR20190114433A (ko) 블록체인 기반의 권한 인증 방법, 단말 및 이를 이용한 서버
KR20190114432A (ko) 블록체인 기반의 권한 인증 방법, 단말 및 이를 이용한 서버
CN113595985A (zh) 一种基于国密算法安全芯片的物联网安全云平台实现方法
CN109525565A (zh) 一种针对短信拦截攻击的防御方法及系统

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant