Equipment identifier construction method and device based on PoW algorithm and computer readable storage medium

A technology of equipment identification and construction method, which is applied in the computer field, can solve the problems of network system damage, attack, and failure, and achieve the effect of secure P2P information encrypted transmission and solving the problem of impersonation

Active Publication Date: 2019-09-27
深圳巴克云网络科技有限公司
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this data protection method based on public key infrastructure, its highly centralized certificate authority will cause the following problems: First, when problems arise during the communication process, the certificate authority cannot make corresponding countermeasures , the two sides of the communication will not be able to solve this problem, leading to the end of the problem; second, once the certificate authority is attacked, the network system will be greatly damaged; third, it is vulnerable to distributed denial of service (Distributed Denial of Service) Service, DDoS) attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment identifier construction method and device based on PoW algorithm and computer readable storage medium
  • Equipment identifier construction method and device based on PoW algorithm and computer readable storage medium
  • Equipment identifier construction method and device based on PoW algorithm and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0043] The invention provides a device identification construction method based on PoW algorithm, which is applied in P2P (Peer to Peer, also called point-to-point or peer-to-peer network). PoW, the full name of Proof of Work, is proof of workload, also known as mining, or PoW consensus mechanism. Most public chains or virtual currencies, such as Bitcoin and Ethereum, are based on the PoW algorithm to achieve their consensus mechanism.

[0044] The P2P network includes multiple node devices, and each node device includes node device complete information (PeerInfo). PeerID is the unique identifier of node equipment in the network, the Hash (hash) of the immutable part in PeerInfo, and the source and destination addresses of data transmission in the P2P network. The immutable part of PeerInfo includes the hardware inf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an equipment identifier construction method and device based on a PoW algorithm and a computer readable storage medium. The method comprises the steps that S10, constructing PeerInfo, generating an asymmetrically encrypted key pair, wherein the asymmetrically encrypted key pair comprises a public key (Public Key) and a private key (Private Key); S20, calculating an invariable part in the PeerInfo according to an information digest algorithm to obtain a PeerID; S30, after receiving a request of the incoming node device to join the P2P network, verifying the node device requesting to join the P2P network according to the PeerID of the node device requesting to join the P2P network; S40, after the node equipment requesting to join the P2P network passes the verification, adding the node equipment passing the verification into the P2P network; and step S50, enabling the device already joining the P2P network to continuously execute the PoW process locally. The PeerID can be constructed without a central server, and the problem of masquerading can be solved.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a PoW algorithm-based device identification construction method, device and computer-readable storage medium. Background technique [0002] Identity authentication can also be called identity verification or authentication, which refers to the process of confirming the identity of the operator in the computer and computer network system, so as to determine whether the user has access and use rights to certain resources, and then make the computer and network system The access policy can be implemented reliably and effectively, preventing attackers from posing as legitimate users to gain access to resources, and ensuring the security of the system and data. [0003] Usually, the integrity of data depends on trust in the system center or third-party entities, such as the master node of the system, the central database, the person in charge of the system, the administrator...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32
CPCH04L63/0876H04L63/045H04L63/123H04L63/126H04L67/1046H04L9/3247H04L9/3239
Inventor 刘智聪
Owner 深圳巴克云网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products