Method for validating a node

A node and database technology, applied in the field of verifying the digital signature of at least one node, network, and public key, can solve problems such as download failures, and achieve the effect of improving efficiency and robustness

Inactive Publication Date: 2020-12-01
BANCO BILBAO VIZCAYA ARGENTARIA
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, said event may have failed to download or be a malicious result that may not be related to owner trust issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for validating a node
  • Method for validating a node
  • Method for validating a node

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 2

[0400] "Embodiment 2". The computer-implemented method of "Embodiment 1", wherein steps b) to e) are performed in parallel with respect to step a).

Embodiment approach 3

[0401]"Embodiment 3". The computer-implemented method according to any one of the preceding "Embodiments", wherein each node (110) includes at least one public and private node key pair and the remaining nodes of the peer-to-peer network (100) the public key of (110), wherein said public and private node key pair is a public key and a private key associated with each node (110),

[0402] Wherein, at least one endorsement message (201) includes at least one trust endorsement value t, an index value (idx) associated with each trust endorsement value t, and an endorsement signature (σ 1 ,σ 2 );as well as

[0403] wherein said endorsement is signed (σ 1 ,σ 2 ) to sign, and

[0404] Wherein, the gossip algorithm of step a) comprises the following steps:

[0405] a.1 in each node (110) listening to other nodes (110) of the network (100) and detecting at least one endorsement message (201) from said other nodes (110); and

[0406] a.2 For each detected endorsement message (201)...

Embodiment approach 4

[0411] "Embodiment 4". The computer-implemented method according to "Embodiment 3", wherein, between steps a.2.2 and a.3, the gossip algorithm in step a) further includes:

[0412] If at least one trust endorsement value t is new, the detected trust endorsement (201) is added to the database (200).

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A computer-implemented method for validating a digital signature of at least one node in a peer to peer network, wherein each node is configured to store a database and at least one trust score s of anode in respect with another node of the peer to peer network, wherein each database is configured to store at least one trust endorsement of another node, the computer-implemented method comprisingthe steps of, a) executing in the plurality of nodes a gossip algorithm, obtaining in each node a updated version of its database, b) locally calculating in each node, a trust score s assigned to other node of the network for each node of its database, c) locally validating in each node, each digital signature of the at least one node of its database, based on the value of said trust score s of the peer to peer network, d) if there is a change in at least one trust endorsement value t of a database of a node, sending the changed trust endorsement to each neighbour node and executing step a), or e) if a new node is added or deleted in the peer to peer network, executing step a). A data processing system, a computer program product and a computer-readable storage medium for carrying out thesteps of the method is also described.

Description

technical field [0001] The invention belongs to the field of authentication of nodes in telecommunication networks, and more specifically, to the authentication of public keys of nodes in decentralized peer-to-peer networks, so-called P2P networks. [0002] In particular, the invention relates to a method for verifying a digital signature of at least one node, each node identifying a user of the network. The method is characterized by a set of analysis steps that allow to establish, for example, a value of the reliability of the public keys from other nodes (users) of the network. Since a node is used by a user, the invention is configured to verify the user, ie his / her digital signature. Background technique [0003] In the prior art, a given user identifier usually holds a specific key. This key is public key cryptography, which allows authentication in communication by a private and public key pair. This can be established with certainty that a message signed with a pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/061H04L63/0823H04L67/1046H04L67/1057H04L67/1068H04W12/67G06F16/2379H04L9/3073H04L9/3247H04L67/1042
Inventor 豪尔赫·德瓦尔桑托斯
Owner BANCO BILBAO VIZCAYA ARGENTARIA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products