Block chain-based big data security authentication method and system

A security authentication and big data technology, applied in the field of big data, can solve the problems of paralysis of the whole network authentication system, node data leakage, heavy operation and maintenance workload, etc., to improve the network robustness, simplify the management process, and save the operation and maintenance cost. Effect

Inactive Publication Date: 2017-02-01
北京明朝万达科技股份有限公司
View PDF3 Cites 104 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (1) There are many distributed storage and computing nodes for big data. If a node is compromised, it will lead to a large amount of data leakage of this node and other nodes
[0008] (2) Once the unified identity authentication center service node is breached, it will cause the paralysi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain-based big data security authentication method and system
  • Block chain-based big data security authentication method and system
  • Block chain-based big data security authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Glossary:

[0042] Hadoop: It is a software framework capable of distributed processing of large amounts of data, the core design is HDFS and MapReduce. HDFS provides storage for massive data, and MapReduce provides calculation for massive data.

[0043] Decentralization: The influence between nodes will form a non-linear causal relationship through the network. Decentralization refers to an open, flat, and equal system phenomenon or structure.

[0044] Blockchain, a technical solution for collectively maintaining a reliable database through decentralization and trustlessness. It is mostly used in user authentication, custody of assets and smart contracts, etc., and value exchange can be completed without third-party access.

[0045] The process of applying blockchain technology is essentially the process of organizing block content and demonstrating the rationality of consensus agreements.

[0046] A smart contract is a computer program based on the blockchain that...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a block chain-based big data security authentication method and system. The method comprises the following steps that a big data node A broadcasts its identity authentication in the whole network; all other big data nodes in the whole network record the identity authentication; if the big data node A is accessed in authentication, the big data node A releases a transaction package including a timestamp in the whole network, the other big data nodes in the whole network check the transaction package, and determine whether the transaction package is consistent with transaction packages stored by the other big data nodes; if the determining results of other big data nodes are consistent, the transaction package is determined legal, and the big data node A is added to a big data block chain; and the security authentication of the big data node A succeeds. Through adoption of the method and system, the network robustness is improved, the management process is simplified, and the operation and maintenance cost is saved.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner 北京明朝万达科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products