Distributed cloud authentication system based on random instruction, apparatus and method thereof

A distributed, cloud authentication technology, applied in the transmission system, electrical components, etc., can solve the problems of slow authentication, long authentication time, etc.

Inactive Publication Date: 2016-08-31
惠众商务顾问(北京)有限公司
View PDF6 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a distributed cloud authentication system, device and method based on random instructions, which can quickly and effectively improve the authentication level, and solve the problems of slow authentication and long authentication time in the existing payment process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed cloud authentication system based on random instruction, apparatus and method thereof
  • Distributed cloud authentication system based on random instruction, apparatus and method thereof
  • Distributed cloud authentication system based on random instruction, apparatus and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0119] A distributed cloud authentication system based on random instructions, including: a terminal, a root node, a distributed node and a local node. It is characterized by:

[0120] The root node does not authenticate the authentication information sent by the terminal, but randomly instructs the distributed nodes to perform authentication and sends the authentication information to the distributed nodes.

[0121] The distributed nodes send the authentication result to the root node.

[0122] The root node judges the result sent by the distributed node according to a preset threshold, and sends the judgment result to the terminal.

[0123] Further, the root node judging the results sent by the distributed nodes according to the preset threshold includes: the root node makes a judgment according to the number of certified distributed nodes specified by the root node, for example, the certified distributed nodes If the number is greater than half of the number of distribute...

Embodiment 2

[0131] Such as figure 1 As shown, the number of distributed nodes is 3, and the number of distributed nodes randomly instructed by the root node is 3.

[0132] Further, the root node judging the results sent by the distributed nodes according to the preset threshold includes: the root node makes a judgment according to the number of passed distributed nodes specified by the root node, that is, 3, for example, the certified distributed node The number of nodes is greater than one-half of the specified number of distributed nodes 3 or 3 / 2, because the number of servers is an integer, which is an integer greater than one-half of the specified number of distributed nodes 3 or 3 / 2 2, that is, at this time, as long as the number of distributed nodes that pass the authentication is 2, it is determined that the authentication is passed, such as the number of distributed nodes that pass the authentication is less than one-half of the number of distributed nodes specified by it 3, that ...

Embodiment 3

[0134] Such as figure 2 As shown, the number of distributed nodes is 5, and the number of distributed nodes randomly instructed by the root node is 3.

[0135] Further, the root node judging the results sent by the distributed nodes according to the preset threshold includes: the root node makes a judgment according to the number of passed distributed nodes specified by the root node, that is, 3, for example, the certified distributed node The number of nodes is greater than one-half of the specified number of distributed nodes 3 or 3 / 2, because the number of servers is an integer, which is an integer greater than one-half of the specified number of distributed nodes 3 or 3 / 2 2, that is, at this time, as long as the number of distributed nodes that pass the authentication is 2, it is determined that the authentication is passed, such as the number of distributed nodes that pass the authentication is less than one-half of the number of distributed nodes specified by it 3, that...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A distributed cloud authentication system based on a random instruction comprises a terminal, a root node, a distributed node and a local node. The system is characterized in that the root node does not authenticate authentication information sent by a terminal, a random instruction distributed node carries out authentication and sends the authentication information to the distributed node; the distributed node sends an authentication result to the root node; and the root node determines the result sent by the distributed node according to a preset threshold and sends a determination result to the terminal. Further, a process that the root node determines the result sent by the distributed node according to a preset threshold comprises the following steps that the root node carries out determination according to an assigned authenticated distributed node number; if the authenticated distributed node number is greater than a half of an assigned distributed node number, authentication is performed continuously; and if the authenticated distributed node number is less than a half of the assigned distributed node number, the authentication is terminated.

Description

technical field [0001] The present invention relates to the technical field of payment, in particular to a distributed cloud authentication system, device and method based on random instructions. Background technique [0002] Blockchain (blockchain) is a brand-new technology, which was born out of the Bitcoin technology that appeared in 2008. It provides a decentralized credit establishment paradigm that does not require trust accumulation. In this paradigm, anyone who does not know each other can join an open and transparent database, through point-to-point bookkeeping, data transmission, certification or contract, without any intermediary to reach a credit consensus. This open and transparent database includes all past transaction records, historical data and other relevant information. All information is stored in a distributed manner and is transparently searchable, and it is guaranteed that it cannot be illegally tampered with in a cryptographic protocol. [0003] The ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0457H04L63/0861H04L63/0892H04L67/10
Inventor 李立中
Owner 惠众商务顾问(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products