Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security trust processing method and device

A technology of a processing device and a processing method, applied in the field of communication, can solve the problems of loss, the collapse of the authentication system, etc., and achieve the effect of solving the problem of insufficient security and safe and reliable Internet services

Active Publication Date: 2021-05-18
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once the public key of the CA center is impersonated, or the private key of the CA center is lost, the entire certification system will collapse

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security trust processing method and device
  • Security trust processing method and device
  • Security trust processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] figure 1 A flowchart of a security trust processing method provided by an embodiment of the present invention; figure 2 A network architecture diagram applicable to the security trust processing method provided by the embodiment of the present invention. The specific security trust processing method steps are as follows:

[0023] Step S101 , nodes in the peer-to-peer network calculate a first hash value according to messages transmitted in the peer-to-peer network, first random numbers and historical hash values.

[0024] Such as figure 2 As shown, the first node, the second node, the third node, and the fourth node form a peer-to-peer network (Peer to Peer, P2P). equal to the number of nodes in the network. Each node is peer-to-peer in the peer-to-peer network, and their respective messages can be synchronized. Specifically, each node can be a user terminal, server, server cluster, and other devices. Each node is installed with an Internet security trust P2P pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide a security trust processing method and device. The method includes: a node in the peer-to-peer network calculates a first hash value according to messages transmitted in the peer-to-peer network, a first random number, and a historical hash value; if the first hash value is less than a threshold, the node calculates the first random number The number, the first hash value, and the first timestamp are sent to other nodes in the peer-to-peer network, and the first timestamp indicates the sending time of the node; the node stores the message transmitted in the peer-to-peer network. The embodiment of the present invention realizes a brand-new decentralized Internet security mechanism, and distributes public keys by means of decentralized distributed records. Rely on any third-party organization or individual to solve the problem of insufficient security of the existing Internet security trust mechanism, and provide users with safe and reliable Internet services.

Description

technical field [0001] The embodiments of the present invention relate to the field of communication technologies, and in particular, to a security trust processing method and device. Background technique [0002] Public key encryption, also known as asymmetric (key) encryption (public key encryption), belongs to the second-level discipline of network security under communication technology, which refers to a pair of unique keys (that is, a public key and a private key). key) encryption method. It solves the issue of key release and management, and is the core of current commercial encryption. In the public key encryption system, what is not disclosed is the private key, and what is disclosed is the public key. [0003] The public key encryption system solves this problem to a certain extent. Each user generates a pair of keys by himself: a public key and a private key. When communicating with another party, send your public key to the other party. In order to show your...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/062H04L67/1074
Inventor 田新雪马书惠
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products