Unmanned aerial vehicle distributed identity authentication method based on block chain

文档序号:1893785 发布日期:2021-11-26 浏览:23次 中文

阅读说明:本技术 一种基于区块链的无人机分布式身份认证方法 (Unmanned aerial vehicle distributed identity authentication method based on block chain ) 是由 隋爱娜 韩鹏斌 谷超男 梁瑞岿 方鸿伟 李瑶 吴江 于 2021-09-17 设计创作,主要内容包括:本发明提出了一种基于区块链的无人机分布式身份认证方法,包括:构建区块链系统环境;发证方为战术云、区块链生成公私钥对,为无人机生成DID和公私钥,将无人机的公私钥和无人机的DID关联,将私钥分配给对应无人机,公钥写入无人机DID文档,并将无人机DID及关联的DID文档、战术云公钥存储到区块链;无人机与战术云信息交互;战术云请求身份验证,战术云通过区块链进行无人机的身份认证,发送给区块链消息;区块链验证战术云身份,区块链根据存储在区块链上的战术云公钥,对来自战术云信息进行解密验证,验证通过则进行下一步无人机的身份验证;区块链验证无人机身份,区块链根据存储在区块链上的DID及DID文档,验证无人机身份信息,并返回结果给战术云。(The invention provides an unmanned aerial vehicle distributed identity authentication method based on a block chain, which comprises the following steps: building a block chain system environment; the certification party generates a public and private key pair for the tactical cloud and the block chain, generates a DID and a public and private key for the unmanned aerial vehicle, associates the public and private keys of the unmanned aerial vehicle with the DID of the unmanned aerial vehicle, distributes the private key to the corresponding unmanned aerial vehicle, writes the public key into the DID document of the unmanned aerial vehicle, and stores the DID of the unmanned aerial vehicle, the associated DID document and the tactical cloud public key into the block chain; the unmanned aerial vehicle interacts with tactical cloud information; the tactical cloud requests identity verification, and the tactical cloud carries out identity authentication of the unmanned aerial vehicle through the block chain and sends the identity authentication to the block chain message; the identity of the tactical cloud is verified through the block chain, the block chain decrypts and verifies tactical cloud information according to the tactical cloud public key stored on the block chain, and the identity verification of the unmanned aerial vehicle is carried out in the next step if the verification is passed; and the blockchain verifies the identity of the unmanned aerial vehicle, verifies the identity information of the unmanned aerial vehicle according to the DID and DID documents stored on the blockchain, and returns a result to the tactical cloud.)

1. An unmanned aerial vehicle distributed identity authentication method based on a block chain is characterized by comprising the following steps:

step S1, constructing a block chain system environment;

step S2, a certificate issuer generates a public and private key pair for tactical cloud and block chain, generates DID and public and private keys for the unmanned aerial vehicle, associates the public and private keys of the unmanned aerial vehicle with the DID of the unmanned aerial vehicle, distributes the private key to the corresponding unmanned aerial vehicle, writes the public key into the DID document of the unmanned aerial vehicle, and stores the DID of the unmanned aerial vehicle, the associated DID document and the tactical cloud public key into the block chain;

step S3, the unmanned aerial vehicle interacts with the tactical cloud information, wherein the unmanned aerial vehicle sends situation information content to the tactical cloud;

step S4, the tactical cloud requests identity verification, and the tactical cloud performs identity authentication of the unmanned aerial vehicle through the blockchain and sends the identity authentication to the blockchain message;

step S5, the block chain verifies the identity of the tactical cloud, the block chain decrypts and verifies tactical cloud information according to the tactical cloud public key stored on the block chain, if the verification is passed, the identity verification of the unmanned aerial vehicle is carried out, if the verification is not passed, the data is discarded, and the data is not processed;

and step S6, the blockchain verifies the identity of the unmanned aerial vehicle, verifies the identity information of the unmanned aerial vehicle according to the DID and DID documents stored on the blockchain, and returns the result to the tactical cloud.

2. The unmanned aerial vehicle distributed identity authentication method based on block chain of claim 1, wherein in the step S3, the situation information comprises: unmanned aerial vehicle DID, unmanned aerial vehicle signature information, situation information abstract and situation information encrypted by the unmanned aerial vehicle private key.

3. The unmanned aerial vehicle distributed identity authentication method based on blockchain of claim 1, wherein in the step S4, the information sent by the tactical cloud to the blockchain comprises: the tactical cloud private key encrypts the integral hash value of the unmanned aerial vehicle DID, the unmanned aerial vehicle signature information and the situation information abstract, and the unmanned aerial vehicle DID, the unmanned aerial vehicle signature information and the situation information abstract.

4. The unmanned aerial vehicle distributed identity authentication method based on the blockchain of claim 1, wherein in the step S5, the blockchain verifies the tactical cloud identity, comprising:

the unmanned aerial vehicle sends relevant information to the tactical cloud, and the information sent to the tactical cloud comprises: the unmanned aerial vehicle DID, unmanned aerial vehicle signature information, situation information abstract and situation information are encrypted by an unmanned aerial vehicle private key;

the tactical cloud receiving a message and requesting identity verification from the blockchain, the data sent to the blockchain comprising: the tactical cloud private key, the unmanned aerial vehicle DID, the unmanned aerial vehicle signature information and the situation information abstract;

the block chain receives and decrypts the data of the tactical cloud, decrypts the message by using a public key of the tactical cloud, and if the decryption is successful, the next step is carried out, otherwise, the data is discarded and is not processed;

and the blockchain verifies whether the message is valid or not, compares the value obtained by the digest algorithm of the unmanned aerial vehicle DID, the unmanned aerial vehicle signature information and the situation information digest part in the data with the decrypted result for verification, if the verification is successful, the unmanned aerial vehicle identity verification is carried out, and if the verification is failed, the data is discarded without processing.

5. The blockchain-based unmanned aerial vehicle distributed identity authentication method of claim 4, wherein the tactical cloud private key comprises: hash (unmanned aerial vehicle DID, unmanned aerial vehicle signature information and situation abstract information) represents an algorithm for producing an abstract, wherein the abstract is produced for the unmanned aerial vehicle DID, the unmanned aerial vehicle signature information and the situation abstract information, and then the tactical cloud private key is used for encryption to prevent information from being tampered, and meanwhile, the Hash is used for the block chain to perform identity authentication of the tactical cloud.

6. The unmanned aerial vehicle distributed identity authentication method based on blockchain of claim 1, wherein in the step S6, the blockchain verifying the identity of the unmanned aerial vehicle comprises:

the block chain acquires unmanned aerial vehicle DID from the data;

the block chain queries related DID documents according to the DID of the unmanned aerial vehicle, and acquires a corresponding public key of the unmanned aerial vehicle through the DID documents;

the block chain decrypts the unmanned aerial vehicle signature information through the acquired unmanned aerial vehicle public key, if decryption is successful, the next step is carried out, and if decryption is failed, failure information is returned to the tactical cloud;

and the block chain compares and verifies the decrypted data with the situation information abstract in the data, if the verification is successful, a failure message is returned to the tactical cloud, and the data of the message returned to the tactical cloud by the block chain is a block chain private key and a verification result.

7. The distributed identity authentication method of unmanned aerial vehicle based on blockchain according to claim 1,

the unmanned aerial vehicle sends a message to a tactical cloud;

the tactical cloud encrypts the unmanned aerial vehicle message and sends the unmanned aerial vehicle message to the block chain;

the blockchain verifies tactical cloud identity;

the block chain utilizes a tactical cloud public key to decrypt the hash value;

judging whether the decryption can be successfully performed, and if not, discarding the data; if so, comparing the hash value with the plaintext to determine whether the verification is successful, otherwise, discarding the data, and if so, verifying the identity of the unmanned aerial vehicle by using the block chain;

inquiring a public key certificate of the unmanned aerial vehicle;

decrypting the signature information of the unmanned aerial vehicle, comparing the signature information with the situation information abstract to verify whether the signature information is successful, if so, returning a correct verification result to the tactical cloud, and if not, returning an incorrect verification result to the tactical cloud.

8. The blockchain-based distributed identity authentication method for unmanned aerial vehicles according to claim 1, wherein the method comprises: a certification party, an unmanned aerial vehicle, a tactical cloud, and a block chain, wherein,

the certificate issuer generates public and private keys and distributed identity identifiers (DID) and DID documents of the unmanned aerial vehicle for the tactical cloud and the block chain;

the unmanned aerial vehicle finishes the DID and DID document binding, and sends situation information content to the tactical cloud in the task execution process;

the tactical cloud is used for interacting with the unmanned aerial vehicle, receiving messages from the unmanned aerial vehicle and sending related instructions to the unmanned aerial vehicle;

the block chain stores the public key of the tactical cloud in a distributed mode, stores the distributed identity identifier DID of the unmanned aerial vehicle and the DID document in a correlated mode, and is used for identity verification of the tactical cloud and the unmanned aerial vehicle.

Technical Field

The invention relates to the technical field of unmanned equipment, in particular to an unmanned aerial vehicle distributed identity authentication method based on a block chain.

Background

Along with the development of unmanned technologies, the application range of unmanned aerial vehicles in various industries is wider and wider, safety problems are easy to occur in unmanned aerial vehicle cluster communication, such as external enemy invasion and the like, and unmanned aerial vehicle identity authentication and friend-foe identification in the information interaction process are very important.

The block chain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like, is a chain data structure formed by combining data blocks in a sequential connection mode according to a time sequence, and is a distributed account book which is guaranteed to be not falsified and counterfeitable in a cryptographic mode. The advantages of distributed storage and non-tampering of the block chain have wide application prospect in the aspect of unmanned aerial vehicle communication.

Disclosure of Invention

The object of the present invention is to solve at least one of the technical drawbacks mentioned.

Therefore, the invention aims to provide an unmanned aerial vehicle distributed identity authentication method based on a block chain.

In order to achieve the above object, an embodiment of the present invention provides a distributed identity authentication method for an unmanned aerial vehicle based on a block chain, including the following steps:

step S1, constructing a block chain system environment;

step S2, a certificate issuer generates a public and private key pair for tactical cloud and block chain, generates DID and public and private keys for the unmanned aerial vehicle, associates the public and private keys of the unmanned aerial vehicle with the DID of the unmanned aerial vehicle, distributes the private key to the corresponding unmanned aerial vehicle, writes the public key into the DID document of the unmanned aerial vehicle, and stores the DID of the unmanned aerial vehicle, the associated DID document and the tactical cloud public key into the block chain;

step S3, the unmanned aerial vehicle interacts with the tactical cloud information, wherein the unmanned aerial vehicle sends situation information content to the tactical cloud;

step S4, the tactical cloud requests identity verification, and the tactical cloud performs identity authentication of the unmanned aerial vehicle through the blockchain and sends the identity authentication to the blockchain message;

step S5, the block chain verifies the identity of the tactical cloud, the block chain decrypts and verifies tactical cloud information according to the tactical cloud public key stored on the block chain, if the verification is passed, the identity verification of the unmanned aerial vehicle is carried out, if the verification is not passed, the data is discarded, and the data is not processed;

and step S6, the blockchain verifies the identity of the unmanned aerial vehicle, verifies the identity information of the unmanned aerial vehicle according to the DID and DID documents stored on the blockchain, and returns the result to the tactical cloud.

Further, in the step S3, the situation information includes: unmanned aerial vehicle DID, unmanned aerial vehicle signature information, situation information abstract and situation information encrypted by the unmanned aerial vehicle private key.

Further, in the step S4, the information sent by the tactical cloud to the block chain includes: the tactical cloud private key encrypts the integral hash value of the unmanned aerial vehicle DID, the unmanned aerial vehicle signature information and the situation information abstract, and the unmanned aerial vehicle DID, the unmanned aerial vehicle signature information and the situation information abstract.

Further, in the step S5, the block chain verifies the tactical cloud identity, including:

the unmanned aerial vehicle sends relevant information to the tactical cloud, and the information sent to the tactical cloud comprises: the unmanned aerial vehicle DID, unmanned aerial vehicle signature information, situation information abstract and situation information are encrypted by an unmanned aerial vehicle private key;

the tactical cloud receiving a message and requesting identity verification from the blockchain, the data sent to the blockchain comprising: the tactical cloud private key, the unmanned aerial vehicle DID, the unmanned aerial vehicle signature information and the situation information abstract;

the block chain receives and decrypts the data of the tactical cloud, decrypts the message by using a public key of the tactical cloud, and if the decryption is successful, the next step is carried out, otherwise, the data is discarded and is not processed;

and the blockchain verifies whether the message is valid or not, compares the value obtained by the digest algorithm of the unmanned aerial vehicle DID, the unmanned aerial vehicle signature information and the situation information digest part in the data with the decrypted result for verification, if the verification is successful, the unmanned aerial vehicle identity verification is carried out, and if the verification is failed, the data is discarded without processing.

Further, the tactical cloud private key comprises: hash (unmanned aerial vehicle DID, unmanned aerial vehicle signature information and situation abstract information) represents an algorithm for producing an abstract, wherein the abstract is produced for the unmanned aerial vehicle DID, the unmanned aerial vehicle signature information and the situation abstract information, and then the tactical cloud private key is used for encryption to prevent information from being tampered, and meanwhile, the Hash is used for the block chain to perform identity authentication of the tactical cloud.

Further, in the step S6, the blockchain verifying the identity of the unmanned aerial vehicle includes:

the block chain acquires unmanned aerial vehicle DID from the data;

the block chain queries related DID documents according to the DID of the unmanned aerial vehicle, and acquires a corresponding public key of the unmanned aerial vehicle through the DID documents;

the block chain decrypts the unmanned aerial vehicle signature information through the acquired unmanned aerial vehicle public key, if decryption is successful, the next step is carried out, and if decryption is failed, failure information is returned to the tactical cloud;

and the block chain compares and verifies the decrypted data with the situation information abstract in the data, if the verification is successful, a failure message is returned to the tactical cloud, and the data of the message returned to the tactical cloud by the block chain is a block chain private key and a verification result.

Further, the drone sends a message to a tactical cloud;

the tactical cloud encrypts the unmanned aerial vehicle message and sends the unmanned aerial vehicle message to the block chain;

the blockchain verifies tactical cloud identity;

the block chain utilizes a tactical cloud public key to decrypt the hash value;

judging whether the decryption can be successfully performed, and if not, discarding the data; if so, comparing the hash value with the plaintext to determine whether the verification is successful, otherwise, discarding the data, and if so, verifying the identity of the unmanned aerial vehicle by using the block chain;

inquiring a public key certificate of the unmanned aerial vehicle;

decrypting the signature information of the unmanned aerial vehicle, comparing the signature information with the situation information abstract to verify whether the signature information is successful, if so, returning a correct verification result to the tactical cloud, and if not, returning an incorrect verification result to the tactical cloud.

Further, the method comprises: a certification party, an unmanned aerial vehicle, a tactical cloud, and a block chain, wherein,

the certificate issuer generates public and private keys and distributed identity identifiers (DID) and DID documents of the unmanned aerial vehicle for the tactical cloud and the block chain;

the unmanned aerial vehicle finishes the DID and DID document binding, and sends situation information content to the tactical cloud in the task execution process;

the tactical cloud is used for interacting with the unmanned aerial vehicle, receiving messages from the unmanned aerial vehicle and sending related instructions to the unmanned aerial vehicle;

the block chain stores the public key of the tactical cloud in a distributed mode, stores the distributed identity identifier DID of the unmanned aerial vehicle and the DID document in a correlated mode, and is used for identity verification of the tactical cloud and the unmanned aerial vehicle.

According to the unmanned aerial vehicle distributed identity authentication method based on the blockchain, the advantages of blockchain distributed storage and non-falsification are fully utilized, the unmanned aerial vehicle DID and DID documents are stored in the blockchain distributed mode, identity authentication of the unmanned aerial vehicle is completed through the blockchain, identity recognition is facilitated, the method is more reliable than third-party centralized storage, communication safety is improved, and malicious invasion of enemies is prevented.

Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.

Drawings

The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:

fig. 1 is a block flow diagram of a distributed identity authentication method for an unmanned aerial vehicle based on a blockchain according to an embodiment of the present invention;

fig. 2 is an architecture diagram of a distributed identity authentication method for an unmanned aerial vehicle based on a blockchain according to an embodiment of the present invention;

fig. 3 is a schematic flowchart of a distributed identity authentication method for an unmanned aerial vehicle based on a blockchain according to an embodiment of the present invention.

Detailed Description

Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.

The invention provides an unmanned aerial vehicle distributed identity authentication method based on a blockchain, which utilizes the blockchain to store the DID and DID documents of an unmanned aerial vehicle in a distributed manner, completes the identity authentication of the unmanned aerial vehicle by the blockchain, is more reliable than the centralized storage of a third party, improves the communication security and prevents hostile invasion of enemies.

The invention discloses an unmanned aerial vehicle distributed identity authentication method based on a block chain, and mainly relates to a module comprising a certificate issuer, an unmanned aerial vehicle, a tactical cloud and the block chain. Public and private keys and distributed identity identifiers DID and DID documents of the unmanned aerial vehicle are generated for the tactical cloud and the block chain based on the certificate issuing party, before the unmanned aerial vehicle and the tactical cloud carry out information interaction, identity authentication of the unmanned aerial vehicle must be completed on the block chain, and after the tactical cloud receives a return message passing the block chain authentication, next step interaction is carried out. The public key, the related DID and the related DID document are stored through the block chain, the single-point fault problem caused by centralized storage is avoided, the public key and the DID document which are interacted each time are obtained from the chain, and compared with a traditional obtaining mode, the method is tamper-proof, and communication safety is guaranteed. The identity authentication of the unmanned aerial vehicle is completed by the block chain, and the unmanned aerial vehicle is more reliable than the centralized storage of a third party, and prevents malicious intrusion of an enemy plane.

As shown in fig. 1, the unmanned aerial vehicle distributed identity authentication method based on the block chain in the embodiment of the present invention includes the following steps:

step S1, building a blockchain system environment.

Step S2, the certification party generates a public and private key pair for the tactical cloud and the block chain, generates a DID and a public and private key for the unmanned aerial vehicle, associates the public and private keys of the unmanned aerial vehicle with the DID of the unmanned aerial vehicle, distributes the private key to the corresponding unmanned aerial vehicle, writes the public key into the DID document of the unmanned aerial vehicle, and stores the DID of the unmanned aerial vehicle, the associated DID document and the public key of the tactical cloud to the block chain.

And step S3, the unmanned aerial vehicle interacts with tactical cloud information, wherein the unmanned aerial vehicle sends situation information content to the tactical cloud.

In an embodiment of the present invention, the situational information includes: unmanned aerial vehicle DID, unmanned aerial vehicle signature information, situation information abstract and situation information encrypted by the unmanned aerial vehicle private key.

It should be noted that the above information is only for the purpose of example, and the situation information may also include other content information, which is set as needed and is not described herein again.

Step S4, the tactical cloud requests identity verification, and the tactical cloud authenticates the identity of the unmanned aerial vehicle through the blockchain and sends the identity authentication to the blockchain message.

Specifically, the information sent by the tactical cloud to the block chain includes: the tactical cloud private key encrypts the integral hash value of the unmanned aerial vehicle DID, the unmanned aerial vehicle signature information and the situation information abstract, and the unmanned aerial vehicle DID, the unmanned aerial vehicle signature information and the situation information abstract.

It should be noted that the above information is only for the purpose of example, and may also include other content information, which is set as needed and is not described herein again.

And step S5, the block chain verifies the identity of the tactical cloud, the block chain decrypts and verifies the information from the tactical cloud according to the tactical cloud public key stored on the block chain, if the verification is passed, the next identity verification of the unmanned aerial vehicle is carried out, and if the verification is not passed, the data is discarded and is not processed.

In this step, the blockchain may verify the identity of the party sending the message, and ensure communication security, including:

1) unmanned aerial vehicle sends relevant information to tactical cloud, and the concrete data of sending include: unmanned aerial vehicle DID + unmanned aerial vehicle signature information + situation information summary + situation information that the unmanned aerial vehicle private key encrypted.

2) The tactical cloud receives the message and requests identity verification from the blockchain, and the sending of the specific data to the blockchain comprises the following steps: tactical cloud private key (Hash (unmanned aerial vehicle DID + unmanned aerial vehicle signature information + situation information digest)) + unmanned aerial vehicle DID + unmanned aerial vehicle signature information + situation information digest. Hash denotes the algorithm that generates the digest. The method comprises the steps of generating a digest of the DID of the unmanned aerial vehicle, signature information of the unmanned aerial vehicle and the situation information abstract, and encrypting the information by using a tactical cloud private key, so that the information is prevented from being tampered, and meanwhile, the method is used for identity authentication of a block chain as a tactical cloud.

3) The block chain receives and decrypts the data of the tactical cloud. And the block chain decrypts the message by using the public key of the tactical cloud, if the decryption is successful, the next step is carried out, and if the decryption is unsuccessful, the data is discarded without processing.

4) The blockchain verifies whether the message is valid. And the blockchain compares the value obtained by the unmanned aerial vehicle DID, the unmanned aerial vehicle signature information and the situation information abstract part in the data through the abstract algorithm with the decrypted result for verification, if the verification is successful, the unmanned aerial vehicle identity verification is carried out, and if the verification is failed, the data are discarded without processing.

And step S6, verifying the identity of the unmanned aerial vehicle by the blockchain, verifying the identity information of the unmanned aerial vehicle by the blockchain according to the DID and the DID documents stored on the blockchain, and returning the result to the tactical cloud.

Specifically, the blockchain verification of the identity of the unmanned aerial vehicle comprises the following steps:

1) the block chain acquires the DID of the unmanned aerial vehicle from the data;

2) the blockchain queries related DID documents according to the DID of the unmanned aerial vehicle, and acquires corresponding public keys of the unmanned aerial vehicle through the DID documents;

3) the block chain decrypts the signature information of the unmanned aerial vehicle through the acquired public key of the unmanned aerial vehicle, if decryption is successful, the next step is carried out, and if decryption is failed, a failure message is returned to the tactical cloud;

4) and the block chain compares and verifies the data obtained by decryption and the situation information abstract in the data, if the verification is successful, a verification success message is returned to the tactical cloud, and if the verification is failed, a failure message is returned to the tactical cloud. The data of the message returned by the block chain to the tactical cloud is a block chain private key (hash (verification result)) + verification result.

The following detailed description will be made in conjunction with the accompanying drawings.

As shown in fig. 2, the method mainly involves modules including a prover, a drone, a tactical cloud, and a blockchain. Fig. 2 is an identity authentication flow diagram. Fig. 3 details the authentication process.

(1) The unmanned aerial vehicle sends a message to the tactical cloud, and the sent specific data are unmanned aerial vehicle DID, unmanned aerial vehicle signature information, situation information abstract and situation information encrypted by an unmanned aerial vehicle private key.

(2) The tactical cloud receives the message and requests authentication from the blockchain. The specific data sent to the block chain is a tactical cloud private key (Hash (unmanned aerial vehicle DID + unmanned aerial vehicle signature information + situation information abstract)) + unmanned aerial vehicle DID + unmanned aerial vehicle signature information + situation information abstract. Hash denotes the algorithm that generates the digest. The method comprises the steps of generating a digest of the DID of the unmanned aerial vehicle, signature information of the unmanned aerial vehicle and the situation information abstract, and encrypting the information by using a tactical cloud private key, so that the information is prevented from being tampered, and meanwhile, the method is used for identity authentication of a block chain as a tactical cloud.

(3) The block chain receives and decrypts the data of the tactical cloud. And the block chain decrypts the message by using the public key of the tactical cloud, if the decryption is successful, the next step is carried out, and if the decryption is unsuccessful, the data is discarded without processing.

(4) The blockchain verifies whether the message is valid. And the blockchain compares the value obtained by the unmanned aerial vehicle DID, the unmanned aerial vehicle signature information and the situation information abstract part in the data through the abstract algorithm with the decrypted result for verification, if the verification is successful, the unmanned aerial vehicle identity verification is carried out, and if the verification is failed, the data are discarded without processing.

(5) And the blockchain verifies the identity of the unmanned aerial vehicle and acquires the DID of the unmanned aerial vehicle from the data.

(6) And the blockchain queries the associated DID document according to the DID of the unmanned aerial vehicle and acquires the corresponding public key of the unmanned aerial vehicle through the DID document.

(7) And the block chain decrypts the signature information of the unmanned aerial vehicle through the acquired public key of the unmanned aerial vehicle, if decryption is successful, the next step is carried out, and if decryption is failed, a failure message is returned to the tactical cloud.

(8) And the block chain compares and verifies the data obtained by decryption and the situation information abstract in the data, if the verification is successful, a verification success message is returned to the tactical cloud, and if the verification is failed, a failure message is returned to the tactical cloud. The data of the message returned by the block chain to the tactical cloud is a block chain private key (hash (verification result)) + verification result.

In summary, the distributed identity authentication method for the unmanned aerial vehicle based on the block chain provided by the embodiment of the invention relates to a certificate issuer, the unmanned aerial vehicle, a tactical cloud and the block chain. Specifically, a certificate issuer generates public and private keys and distributed identity identifiers (DID) and DID documents of an unmanned aerial vehicle for a tactical cloud and a block chain; the unmanned aerial vehicle finishes DID and DID document binding, and sends situation information content to the tactical cloud in the task execution process; the tactical cloud is used for interacting with the unmanned aerial vehicle, receiving a message from the unmanned aerial vehicle and sending a related instruction to the unmanned aerial vehicle; the block chain adopts a public key of a distributed storage tactical cloud, and stores the distributed identity identifier DID and DID document of the unmanned aerial vehicle in an associated mode for identity verification of the tactical cloud and the unmanned aerial vehicle.

The specific process of the invention is as follows: the unmanned aerial vehicle sends a message to a tactical cloud; the tactical cloud encrypts the unmanned aerial vehicle message and sends the unmanned aerial vehicle message to the block chain; verifying the tactical cloud identity by using a block chain; decrypting the block chain by using the tactical cloud public key to obtain a hash value; judging whether the decryption can be successfully performed, and if not, discarding the data; if so, comparing the hash value with the plaintext to determine whether the verification is successful, otherwise, discarding the data, and if so, verifying the identity of the unmanned aerial vehicle by using the block chain; inquiring a public key certificate of the unmanned aerial vehicle; decrypting the signature information of the unmanned aerial vehicle, comparing the signature information with the situation information abstract to verify whether the signature information is successful, if so, returning a correct verification result to the tactical cloud, and if not, returning an incorrect verification result to the tactical cloud.

According to the unmanned aerial vehicle distributed identity authentication method based on the blockchain, the advantages of blockchain distributed storage and non-falsification are fully utilized, the unmanned aerial vehicle DID and DID documents are stored in the blockchain distributed mode, identity authentication of the unmanned aerial vehicle is completed through the blockchain, identity recognition is facilitated, the method is more reliable than third-party centralized storage, communication safety is improved, and malicious invasion of enemies is prevented.

In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.

Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made in the above embodiments by those of ordinary skill in the art without departing from the principle and spirit of the present invention. The scope of the invention is defined by the appended claims and equivalents thereof.

11页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种无人机群抗风险的密码安全分级防护方法

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!