Non-key signature infrastructure building method based on block chain

A construction method and blockchain technology, applied in the field of blockchain-based keyless signature infrastructure construction, can solve the problems of long CRH release cycle, difficult identification and processing, lack of credibility of the release media, etc., and achieve throughput Strong volume and scalability, low storage and network load requirements

Inactive Publication Date: 2017-09-15
光载无限(北京)科技有限公司
View PDF2 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0020] The purpose of the present invention is to propose a block chain-based KSI core layer and release layer construction method, without changing the current keyless signature infrastructure, using the block chain to complete the identity authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Non-key signature infrastructure building method based on block chain
  • Non-key signature infrastructure building method based on block chain
  • Non-key signature infrastructure building method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0043] In order to make the objectives, technical solutions and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the drawings and specific embodiments.

[0044] n Blockchain

[0045] Blockchain is a decentralized recording technology. It participates in any number of nodes in the system, and records all the data exchanged in the system for a period of time into a block through cryptographic methods, and at the same time generates the block The fingerprint is used to link the next block and verify. All participating nodes in the system jointly determine the record and verification, and jointly determine whether the record is true, and each node can make a copy of the complete record. Compared with traditional accounting technology, its characteristics are as follows:

[0046] 1) The chain jointly maintained by the system nodes is constantly growing, and only records can be added, and the records that have ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a non-key signature infrastructure building method based on a block chain. The method comprises the steps that a core layer node is used to embed a root hash value of an aggregation layer into an OP_RETURN transaction script through identity authentication; broadcasting is carried out in the block chain network; packaging into the block is carried out to form a KSI Calendar hash account book; KSI release layer architecture based on the block chain is provided; a miner plays the role of release node in KSI; transaction information in the block chain network is collected; a Merkle tree is built; the release node simply needs to extract contents in OP_RETURN in transaction for Merkle tree building, so as to finally form CRH; and finally CRH is written into the block head. According to the invention, without changing the current non-key signature infrastructure architecture, the block chain is used to complete identity authentication of the KSI core layer node; the public transparency of the Calendar hash account book is protected; and the problems of long CRH release cycle, poor release media credibility and difficult recognition and processing in the prior art are solved.

Description

technical field [0001] The invention relates to data security technology, in particular to a construction method of a blockchain-based keyless signature infrastructure. Background technique [0002] In recent years, internal attacks mainly involving system destruction, information theft and electronic fraud have posed a serious threat to personal, corporate and even national security due to their strong concealment and destructive characteristics. Traditional solutions, such as continuous monitoring, data encryption and other measures, are expensive to deploy and maintain. With the increase of mobile devices and pluggable storage facilities, it is increasingly difficult to rely on traditional security solutions to solve internal attacks. [0003] In order to solve the above problems, the most fundamental and effective way is to ensure that the records of illegal use of digital assets cannot be changed. KSI (Keyless Signature Infrastructure) is just such an infrastructure th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32G06F21/64
CPCH04L9/3247G06F21/64H04L9/3236H04L9/3239
Inventor 王翠翠朱佩江马炬
Owner 光载无限(北京)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products