[go: up one dir, main page]

CN119276500A - A hardware module identification method based on blockchain technology - Google Patents

A hardware module identification method based on blockchain technology Download PDF

Info

Publication number
CN119276500A
CN119276500A CN202411782888.9A CN202411782888A CN119276500A CN 119276500 A CN119276500 A CN 119276500A CN 202411782888 A CN202411782888 A CN 202411782888A CN 119276500 A CN119276500 A CN 119276500A
Authority
CN
China
Prior art keywords
hardware module
module
identification method
identifier
blockchain technology
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202411782888.9A
Other languages
Chinese (zh)
Inventor
崔建军
许文波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Tegao Information Technology Co ltd
Original Assignee
Shanghai Tegao Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Tegao Information Technology Co ltd filed Critical Shanghai Tegao Information Technology Co ltd
Priority to CN202411782888.9A priority Critical patent/CN119276500A/en
Publication of CN119276500A publication Critical patent/CN119276500A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

本发明涉及区块链技术领域,具体是一种基于区块链技术的硬件模组标识方法,基于模组芯片ID和自定义随机数规则,通过随机数发生器生成seed随机数;对所述seed随机数进行哈希计算获得私钥,并通过非对称加密算法对所述私钥进行计算,获得公钥;对所述公钥进行哈希计算得到Hash1,截取所述Hash1的前20个字节记作Hash2,在所述Hash2之前添加DID类型字节生成Hash3;对所述Hash3进行哈希计算得到Hash4,并对所述Hash4进行Base58编码获得DID,将所述DID作为硬件模组唯一DID标识。本方法生成的DID标识能有效解决现有硬件芯片模组的身份标识方法存在的无法识别身份和安全认证等问题,可为设备间的安全通信提供基础保障。

The present invention relates to the field of blockchain technology, and specifically to a hardware module identification method based on blockchain technology. Based on the module chip ID and a custom random number rule, a seed random number is generated by a random number generator; a private key is obtained by performing a hash calculation on the seed random number, and the private key is calculated by an asymmetric encryption algorithm to obtain a public key; the public key is hashed to obtain Hash1, the first 20 bytes of Hash1 are intercepted and recorded as Hash2, and a DID type byte is added before Hash2 to generate Hash3; the Hash3 is hashed to obtain Hash4, and the Hash4 is Base58 encoded to obtain a DID, and the DID is used as the unique DID identification of the hardware module. The DID identification generated by this method can effectively solve the problems of the inability to identify identity and security authentication in the existing identification method of the hardware chip module, and can provide a basic guarantee for secure communication between devices.

Description

Hardware module identification method based on blockchain technology
Technical Field
The invention relates to the technical field of blockchain, in particular to a hardware module identification method based on a blockchain technology.
Background
With the rapid development of internet of things devices, security and unique identification become key issues.
And the blockchain technology is an innovative technology based on a distributed ledger and encryption technology. The block chain technology has the characteristics of decentralization, non-tampering, transparency, traceability and the like, and has wide application prospects in the fields of finance, medical treatment, government affairs and the like. With the rapid development of blockchain technology, different kinds of public chains, alliance chains and private chains are appeared, and the public chains, the alliance chains and the private chains carry blockchain scenes of different important services.
The security authentication based on the blockchain ensures the uniqueness and security of the equipment identity by utilizing the characteristics of decentralization and non-falsification of the blockchain. Each device has a unique identity on the blockchain, and the validity of the device is confirmed by verifying this identity. The existing equipment identification method has risks of incapability of identifying identity, incapability of performing safety authentication and the like, and further incapability of providing basic guarantee for safety communication among equipment. ‌ A
Therefore, a new solution is needed to solve the above-mentioned problems.
Disclosure of Invention
The invention aims to solve the problems of the prior art, and provides a hardware module identification method based on a blockchain technology, so as to solve the technical problems of the identity identification method of the existing hardware chip module and the uniqueness, the safety and the verifiability of the identity identification method.
The above purpose is realized by the following technical scheme:
A hardware module identification method based on a blockchain technology comprises the following steps:
based on the module chip ID and the custom random number rule, generating a seed random number by a random number generator;
carrying out hash calculation on the seed random number to obtain a private key, and calculating the private key through an asymmetric encryption algorithm to obtain a public key;
Hash calculation is carried out on the public key to obtain a Hash1, the first 20 bytes of the Hash1 are intercepted and recorded as a Hash2, DID type bytes are added before the Hash2 to generate a Hash3, hash calculation is carried out on the Hash3 to obtain a Hash4, base58 coding is carried out on the Hash4 to obtain a DID, and the DID is used as a unique DID identifier of a hardware module.
Further, the unique DID identification of the hardware module is stored in a flash of the device, and the unique DID identification of the hardware module and a DID document containing detailed information of the DID are subjected to uplink consensus through a blockchain.
Further, the DID verification comprises a module management platform, a hardware module and equipment;
the module management platform is used as an issuer of a VC certificate, and performs digital signature on the DID document of the hardware module to prove the authenticity of the DID attribute of the hardware module;
The hardware module is used as a holder of the VC certificate, and is used for signing the verification of the VC certificate and sending the VP obtained after signing to the equipment;
The device is used as a verifier for verifying the integrity and the source of the received VP, and after passing verification and confirming the identity security of the module, the device transmits data.
Further, the module chip ID is a unique identifier on the module chip, and is used to distinguish between different module chips, so as to ensure that each module chip has a unique identity.
Further, the hash calculation adopts a Sha-512 algorithm.
Further, the asymmetric encryption algorithm adopts Secp k1 elliptic curve algorithm.
Further, the DID format is as follows:
did:<example>:<identifier>
Wherein the DID is fixed, identifying this is a DID identifier, < sample > specifies the resolution method of the DID, < identifier > represents a unique identifier that distinguishes between different DIDIs and remains unique in the context of the corresponding method.
The hardware module identification method based on the blockchain technology can effectively solve the problems that the identity identification method of the existing hardware chip module cannot identify identity, safety authentication and the like, and can provide basic guarantee for safety communication among devices.
Drawings
FIG. 1 is a flow chart of a hardware module identification method based on blockchain technology according to the present invention;
FIG. 2 is a diagram illustrating DID verification in a hardware module identification method based on a blockchain technique according to the present invention.
Detailed Description
The invention is described in further detail below with reference to the drawings and examples. The described embodiments are only some, but not all, embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
As shown in fig. 1, a hardware module identification method based on a blockchain technology includes:
Step (1) seed generation is based on a module chip ID and a custom random number rule, and a seed random number is generated through a random number generator;
In particular, in computer science and programming, seed is commonly used for random number generators to ensure repeatability and predictability of random number sequences (given the same seed), which is an initial value that is used by the random number generator to generate a series of random numbers.
It should be noted that, in this embodiment, the module chip ID is a unique identifier on the module chip, which is used to distinguish between different module chips, and ensure that each module chip has a unique identity, and is usually designed by the manufacturer, and includes some basic information about the chip, such as the manufacturer, the type of chip, the date of production, etc., and is an identifier (for example, a chip model or serial number) that is physically embedded in the chip during the chip manufacturing process, and is unique in any case and not allowed to be modified. For the internal ID of the chip in the embedded system, the internal ID is usually stored in a specified memory address of the chip, and different memory addresses of the chip are different, so that the specific memory address can be read according to a chip manual to obtain the chip ID.
Generating a public and private key, carrying out hash calculation on the seed random number to obtain a private key, and calculating the private key through an asymmetric encryption algorithm to obtain a public key;
specifically, since the private key cannot be disclosed externally, the custom rule for generating Seed needs to ensure randomness and be difficult to crack. The public key is disclosed externally, the public key is obtained by calculation from the private key according to an asymmetric encryption algorithm, and a third party can verify the signature and other operations by using the public key.
And (3) generating a DID, carrying out Hash calculation on the public key to obtain a Hash1, intercepting the first 20 bytes of the Hash1, recording the obtained Hash1 as a Hash2, adding a DID type byte before the Hash2 to generate a Hash3, carrying out Hash calculation on the Hash3 to obtain a Hash4, carrying out Base58 coding on the Hash4 to obtain a DID, and taking the DID as a unique DID identifier of a hardware module.
Specifically, the embodiment uses the public key to generate the unique DID identifier of the hardware module, so that the module can be verified independently of any centralized entity, authority or third party. The security of the public key can be further enhanced by performing hash computation on the public key for a plurality of times. By applying the SHA-512 algorithm for multiple times, the difficulty of recovering the original data by an attacker through brute force cracking or collision attack can be increased, so that the safety of the data is improved.
In the scheme, the unique DID identification of the hardware module is generated based on an asymmetric encryption algorithm and a hash algorithm, and the unique DID identification is specifically:
The hash algorithm used is an algorithm that converts input data of arbitrary length into fixed-length output. Even a slight change in the input data of the hash algorithm causes a significant change in the output data, and thus the data output by the hash algorithm has uniqueness. Furthermore, the length of the output of the hash algorithm is fixed. Most importantly, the hash algorithm has irreversibility, namely the original data cannot be reversely deduced through the hash value, so that the security and the irreversibility of the unique DID are ensured.
In this embodiment, the hash computation uses the Sha-512 algorithm, which can generate a 512-bit hash value, typically represented as a string of 128-character hexadecimal digits. The SHA-512 process on the public key is typically performed to obtain a fingerprint (fingerprint) of the public key, which can be used to identify and verify the uniqueness of the public key.
The asymmetric encryption algorithm employed is an important cryptographic tool that uses a pair of related keys, the public key and the private key, as compared to the symmetric encryption algorithm. There is a special mathematical relationship between these two keys, the public key can be used to encrypt the data, and the private key can be used to decrypt the data.
In this embodiment, the asymmetric encryption algorithm uses Secp k1 elliptic curve algorithm for public key generation.
In the embodiment, the unique DID identifier of the hardware module is stored in the flash of the device, and the unique DID identifier of the hardware module and the DID document containing the detailed information of the DID are uplink consensus through the blockchain.
Wherein, the DID format is as follows:
did:<example>:<identifier>
Wherein the DID is fixed, identifying this is a DID identifier, < sample > specifies the resolution method of the DID, < identifier > represents a unique identifier that distinguishes between different DIDIs and remains unique in the context of the corresponding method.
And the DID document is a detailed description of the DID, after the DID document is generated, the DID and the DID document are uploaded to a blockchain for verification, and after the uploading is successful, all people can inquire the DID and the DID document.
As a specific embodiment of the DID document in this aspect, the DID document is exemplified as follows:
{
the/DID document format and field specification address
"@context": "https://w3id.org/did/v1",
"DID", globally unique
"id": "DID:module:7f8ca8982f6cc6e8ea087bd9457ab8024bd2",
The first creation of a 1 for the version number, and subsequent updates or deletions are added with 1 based on the previous operation
"version": 1,
Type of operation, create, update, delete
"operation": "create",
Time of creation
"created": "2023-02-02 16:02:20",
Time of update
"updated": "2023-02-03 16:02:20",
Public key information of main/standby
"publicKey": [
{
/(Public key ID)
"id": "DID:module:7f8ca8982f6cc6e8ea087bd9457ab8024bd2#keys-1",
Type of/(generated public key)
"type": "Secp256k1",
Public key
"publicKeyHex": "02b97c30de767f084ce3080168ee293053ba33b235d7116a3263d29f1450936b71"
},
{
"id": "DID:module:7f8ca8982f6cc6e8ea087bd9457ab8024bd2#keys-2",
"type": "Secp256k1",
"publicKeyHex": "e3080168ee293053ba33b235d7116a3263d29f1450936b71"
}
],
Public key ID used by the holder
"authentication": "DID:module:7f8ca8982f6cc6e8ea087bd9457ab8024bd2#key-1",
Ultrami public key ID usable for reset
"recovery": [
"DID:module:7f8ca8982f6cc6e8ead9457ab8024bd2#key-2"
],
Signing document using private key corresponding to public key ID of authentication field (signatureValue field excluded)
"signatureValue": "02b97c30de767f084ce3080168ee293053ba33b235d7116a3263d29f1450936b71qwe"
}
As a specific embodiment of the scheme, it is assumed that there is a hardware module whose CPU chip ID is 0x0F8BFBFF00050657, and if there is a hardware random number generator, the 64-bit value generated is read as a random number (if there is no, the time elapsed since the system was started up is the lower 32 bits according to the current period time as the upper 32 bits), and the read value is 0x0768BB4EAD2C139F. The two numbers are then concatenated as a 16 byte sequence, i.e. a 128bits number, which is the Seed. Inputting the private key sk into the SHA512 hash function, and calculating the private key sk:
sk=sha512 (0 x0F8BFBFF00050657 |0 x0768BB4EAD2C139 f|0 x 00000000) =
5daea052dcc51832f4cd2b23a85b7348c4b3e175c1d0647dcbd417b8e4f81ad61ff454eb0faef275f7f29e34d4a1b61f60f6c6734b4abf3d8b058174ccd74cef
Note that (1) the symbol indicates that two numbers are concatenated in a byte sequence from high significant bits to low significant bits to form a new one
Byte sequence of (a). For the example herein, even if one input byte sequence is formed:
0F 8B FB FF 00 05 06 57 07 68 BB 4E AD 2C 13 9F 00 00 00 00
(2) The last 4 bytes in the input are the calculation iteration factors, avoiding the calculation result as part of the private key
When the non-0 and within the limits of the defined domain requirements of the encryption algorithm are not met, add 1 to it, recalculate,
Until the requirements are met.
The result of the calculations given above is 128 16 bins, 512 bits, arranged from low byte to high byte.
Taking its lower 256bits as its private key sk, i.e. 64 16 digits starting from the left hand side of the number, i.e.
sk = 5daea052dcc51832f4cd2b23a85b7348c4b3e175c1d0647dcbd417b8e4f81ad6
Based on the private key sk, the public key pk is calculated based on the SECP256k1 algorithm:
Then pk= DerivePublicKey (sk) =
038D66ADC909AE996F9B4EB39C6A5DB02C62F9B79F27D222EBA08294A5DF1373FB
The DID is calculated from the public key pk, steps and results are as follows:
(1) Hash1 = SHA512(pk) =
0fd7c6cf703ff4b54e384df4e75d9270afb10524783d1e1d7d1750bbdfd85548b0195d470f18f859af78f3a47006a57ccb9e67acbbea0ef490e8a38d292e1aaf
(2) Hash2 = Hash1[0 .. 19] = 0fd7c6cf703ff4b54e384df4e75d9270afb10524
Note [.] indicates that a value in a certain range of its byte sequence is taken, numbered from left to right, starting from 0
(3) Hash 3=did type byte (02) |hash 2=020 fd7c6cf703ff4b54e384df4e75d9270afb10524
Note that the DID type byte is used to describe the value of the DID type, which can be any value, here we assume it is 02
(4) Hash4 = SHA512(Hash3) =
49892d7883cbd56618a1ff84dad51cd4718e038eb2a0db1d7739f41f587bbcf8a2a8e6e0b6637f8bc2e7c069af3557aa55e39abb28ac86893965faf71eb09508
(5) DID = Base58(Hash4) =
wczewgmX3G8oMWjLFQ8MzbNspeD9KML49j2XrazVNRn9Ze9iHKPnRZi8EBcoQqN65xqsEaCkNogGBVq58Jored98zosba。
As shown in fig. 2, the present solution also provides DID verification, including a module management platform, a hardware module, and a device;
The module management platform is used as an issuer of VC (Verifiable Credential) certificates, and is used for digitally signing the DID document of the hardware module to prove the authenticity of the DID attribute of the hardware module;
The hardware module is used as a holder of VC (Verifiable Credential) certificates and is used for signing the verification of the VC (Verifiable Credential) certificates and sending VP (Verifiable Presentation) obtained after signing to the equipment;
The device is used as a verifier for verifying the integrity and the source of the received VP (Verifiable Presentation), and after passing verification and confirming the identity security of the module, the device transmits data. The device is an embedded device.
The above description is for the purpose of illustrating the embodiments of the present invention and is not to be construed as limiting the invention, but is intended to cover all modifications, equivalents, improvements and alternatives falling within the spirit and principle of the invention.

Claims (7)

1.一种基于区块链技术的硬件模组标识方法,其特征在于,包括:1. A hardware module identification method based on blockchain technology, characterized by comprising: 基于模组芯片ID和自定义随机数规则,通过随机数发生器生成seed随机数;Generate a seed random number through a random number generator based on the module chip ID and custom random number rules; 对所述seed随机数进行哈希计算获得私钥,并通过非对称加密算法对所述私钥进行计算,获得公钥;Performing hash calculation on the seed random number to obtain a private key, and calculating the private key using an asymmetric encryption algorithm to obtain a public key; 对所述公钥进行哈希计算得到Hash1,截取所述Hash1的前20个字节记作Hash2,在所述Hash2之前添加DID类型字节生成Hash3;对所述Hash3进行哈希计算得到Hash4,并对所述Hash4进行Base58编码获得DID,将所述DID作为硬件模组唯一DID标识。The public key is hashed to obtain Hash1, the first 20 bytes of Hash1 are intercepted and recorded as Hash2, and the DID type byte is added before Hash2 to generate Hash3; the Hash3 is hashed to obtain Hash4, and the Hash4 is Base58 encoded to obtain DID, and the DID is used as the unique DID identifier of the hardware module. 2.根据权利要求1所述的一种基于区块链技术的硬件模组标识方法,其特征在于:将所述硬件模组唯一DID标识存储于设备的flash中,并通过区块链将所述硬件模组唯一DID标识和包含所述DID的详细信息的DID文档上链共识。2. According to claim 1, a hardware module identification method based on blockchain technology is characterized in that: the unique DID identifier of the hardware module is stored in the flash of the device, and the unique DID identifier of the hardware module and the DID document containing detailed information of the DID are uploaded to the chain for consensus through the blockchain. 3.根据权利要求2所述的一种基于区块链技术的硬件模组标识方法,其特征在于:还包括DID校验,包括模组管理平台、硬件模组和设备;3. A hardware module identification method based on blockchain technology according to claim 2, characterized in that: it also includes DID verification, including a module management platform, a hardware module and a device; 所述模组管理平台作为VC凭证的颁布者,对所述硬件模组的所述DID文档进行数字签名,用以证明所述硬件模组的所述DID属性的真实性;The module management platform, as the issuer of the VC credential, digitally signs the DID document of the hardware module to prove the authenticity of the DID attribute of the hardware module; 所述硬件模组作为VC凭证的持有者,用于对所述VC凭证的验证进行签名,并将签名后得到的VP发送给所述设备;The hardware module, as the holder of the VC credential, is used to sign the verification of the VC credential and send the signed VP to the device; 所述设备作为验证者,用于对接受的所述VP进行完整性和来源的验证,待验证通过,并确认模组身份安全之后,再进行数据的传输。The device acts as a verifier to verify the integrity and source of the received VP. After the verification is passed and the module identity is confirmed to be secure, data transmission is performed. 4.根据权利要求1所述的一种基于区块链技术的硬件模组标识方法,其特征在于:所述模组芯片ID是模组芯片上的一个独特标识符,用于区分不同的模组芯片,确保每个模组芯片都具有唯一的身份。4. According to a hardware module identification method based on blockchain technology as described in claim 1, it is characterized in that: the module chip ID is a unique identifier on the module chip, which is used to distinguish different module chips and ensure that each module chip has a unique identity. 5.根据权利要求1所述的一种基于区块链技术的硬件模组标识方法,其特征在于:所述哈希计算采用Sha-512算法,其可以生成一个512位的哈希值,通常表示为128个字符的十六进制数字字符串。5. According to a hardware module identification method based on blockchain technology as described in claim 1, it is characterized in that: the hash calculation adopts the Sha-512 algorithm, which can generate a 512-bit hash value, usually expressed as a 128-character hexadecimal digital string. 6.根据权利要求1所述的一种基于区块链技术的硬件模组标识方法,其特征在于:所述非对称加密算法采用Secp256k1椭圆曲线算法。6. According to a hardware module identification method based on blockchain technology as described in claim 1, it is characterized in that: the asymmetric encryption algorithm adopts the Secp256k1 elliptic curve algorithm. 7.根据权利要求1所述的一种基于区块链技术的硬件模组标识方法,其特征在于:所述DID的格式如下:7. According to a hardware module identification method based on blockchain technology according to claim 1, it is characterized in that: the format of the DID is as follows: did:<example>:<identifier>did:<example>:<identifier> 其中,did是固定的,标识这是一个DID标识符;<example>指定了DID的解析方法;<identifier>代表一个唯一的标识符,用于区分不同的DIDI,并在对应的方法的上下文中保持唯一性。Among them, did is fixed, indicating that this is a DID identifier; <example> specifies the resolution method of DID; <identifier> represents a unique identifier used to distinguish different DIDs and maintain uniqueness in the context of the corresponding method.
CN202411782888.9A 2024-12-06 2024-12-06 A hardware module identification method based on blockchain technology Pending CN119276500A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202411782888.9A CN119276500A (en) 2024-12-06 2024-12-06 A hardware module identification method based on blockchain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202411782888.9A CN119276500A (en) 2024-12-06 2024-12-06 A hardware module identification method based on blockchain technology

Publications (1)

Publication Number Publication Date
CN119276500A true CN119276500A (en) 2025-01-07

Family

ID=94111570

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202411782888.9A Pending CN119276500A (en) 2024-12-06 2024-12-06 A hardware module identification method based on blockchain technology

Country Status (1)

Country Link
CN (1) CN119276500A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833114A (en) * 2018-06-13 2018-11-16 上海交通大学 A blockchain-based decentralized identity authentication system and method
CN111988149A (en) * 2020-08-31 2020-11-24 中国信息通信研究院 Data sharing method, device and system in industrial internet
WO2022016841A1 (en) * 2020-07-21 2022-01-27 杜晓楠 User credit scoring method in decentralized identity system and computer readable medium
CN114584316A (en) * 2022-02-28 2022-06-03 广州世安智链科技有限公司 Decentralized DID identity aggregation verification method and device for Internet of things
CN115964727A (en) * 2022-12-19 2023-04-14 毛成磊 Meta universe-based privacy protection system
CN118779384A (en) * 2024-09-05 2024-10-15 山东大学 A decentralized identity storage method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833114A (en) * 2018-06-13 2018-11-16 上海交通大学 A blockchain-based decentralized identity authentication system and method
WO2022016841A1 (en) * 2020-07-21 2022-01-27 杜晓楠 User credit scoring method in decentralized identity system and computer readable medium
CN111988149A (en) * 2020-08-31 2020-11-24 中国信息通信研究院 Data sharing method, device and system in industrial internet
CN114584316A (en) * 2022-02-28 2022-06-03 广州世安智链科技有限公司 Decentralized DID identity aggregation verification method and device for Internet of things
CN115964727A (en) * 2022-12-19 2023-04-14 毛成磊 Meta universe-based privacy protection system
CN118779384A (en) * 2024-09-05 2024-10-15 山东大学 A decentralized identity storage method and system

Similar Documents

Publication Publication Date Title
US20250286732A1 (en) Personal device security using cryptocurrency wallets
CN103733564B (en) Utilize the digital signature of implicit certificate chain
CN107395368B (en) Digital signature method, decapsulation method and decryption method in media-free environment
CN108292402A (en) Deterministic and hierarchical deterministic keys of public secrets for secure exchange of information
CN119783138B (en) Blockchain-driven distributed privacy data storage and access control method and system
CN119011137B (en) Secure communication protocol method and system based on microchip fingerprint technology
CN112887081B (en) SM 2-based signature verification method, device and system
CN113824564B (en) Online signing method and system based on blockchain
CN109245899B (en) Trust chain design method based on SM9 cryptographic algorithm
WO2022050833A1 (en) Method for electronic signing and authenticaton strongly linked to the authenticator factors possession and knowledge
CN111340485A (en) A configuration method, terminal and root certificate server for a digital certificate for a consortium blockchain
CN112118113A (en) Multi-party cooperative group signature method, device, system and medium based on SM2 algorithm
CN114268447A (en) File transmission method and device, electronic equipment and computer readable medium
CN107947939A (en) Support the PDF endorsement methods and system of SM3 cryptographic Hash algorithm and SM2 Digital Signature Algorithms
WO2025001230A1 (en) Digital certificate management method, apparatus, device and system and readable storage medium
CN114844643B (en) Method and electronic device for obtaining adapter signature based on bilinear mapping
CN116915407A (en) Electronic public certificate verification method and system based on block chain
CN110188545A (en) A data encryption method and device based on chain database
CN119276500A (en) A hardware module identification method based on blockchain technology
CN113837756A (en) Electronic invoice verification method and system
CN104320247A (en) Shared key protection method based on elliptical curve and fingerprint fuzzy vault
JP7428239B2 (en) Memory processing device, memory verification device, memory update device, memory protection system, method and program
CN114679311A (en) Block chain-based document data security verification method
CN119814279B (en) Hybrid encryption authentication method, device and equipment for quantum resistance calculation
CN118555068B (en) PUF-based TEE trusted root generation and use method and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20250107