Unlock instant, AI-driven research and patent intelligence for your innovation.

Security authentication method and system for mining operations

A security authentication and business technology, applied in the Internet field, can solve problems such as cooling fans running wild, graphics card, CPU hardware loss, system performance impact, etc., to improve security, avoid network security problems, and achieve the effect of security authentication

Active Publication Date: 2019-05-07
BEIJING BITMAIN TECH LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A computer implanted with a Bitcoin "mining Trojan horse" will have a great impact on system performance, the operation of the computer will obviously slow down, and the cooling fan will spin wildly; another hazard is that the "mining Trojan horse" will consume a lot of power and cause Rapid loss of hardware such as graphics card and CPU
[0004] The above-mentioned network security issues have seriously affected the normal operation of Bitcoin mining operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method and system for mining operations
  • Security authentication method and system for mining operations
  • Security authentication method and system for mining operations

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that the relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.

[0028] At the same time, it should be understood that, for the convenience of description, the sizes of the various parts shown in the drawings are not drawn according to the actual proportional relationship.

[0029] The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses.

[0030] Techniques, methods and devices known to those of ordinary skill in the relevant art may not be discussed in detail, but where appropriate, such techniques, methods and devices should be considered part of the descript...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a security authentication method and system for a mining service, wherein the method comprises the following steps: an authentication central server receives an authentication request reported by a miner, wherein the authentication request includes output result data and chip ID; the authentication central server obtains working task information from a mine pool, and authenticates the output result data according to the obtained working task information; if the output result data passes authentication, the output result data is signed, so that signature data is obtained; an authentication response message is fed back to the miner; the authentication response message includes the signature data and the chip ID; and the miner determines whether mining operation is carried out or not by judging whether the authentication response message is received or not and whether the signature data in the authentication response message is correct or not. By means of the embodiment of the invention, the security of the bitcoin mining service can be improved.

Description

technical field [0001] The invention relates to Internet technology, in particular to a security authentication method and system for mining business. Background technique [0002] Bitcoin (Bitcoin) is an electronic currency and digital currency generated by open source peer-to-peer (P2P) software, and is a network virtual asset. Bitcoin is also translated as "bit gold". Anyone can download and run the bitcoin client to participate in the creation of bitcoins. Bitcoin miners first mined through Intel or AMD's central control unit (CPU) products. [0003] With the gradual popularization and application of Bitcoin, the Bitcoin mining machine as a "mining artifact" has also become popular rapidly, and at the same time, network security issues have also followed. Bitcoin mining faces three types of threats: Bitcoin "mining Trojan horse", hacking of mining user accounts, and the fall of the trading market. Among them, the Bitcoin "mining Trojan horse" is a malicious program t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L1/00H04L9/32
CPCH04L1/0061H04L9/3249H04L63/126
Inventor 詹克团段凯孙国臣
Owner BEIJING BITMAIN TECH LTD