Unlock instant, AI-driven research and patent intelligence for your innovation.

Security and trust processing method and device

A processing device and processing method technology, applied in the field of communication, can solve problems such as loss and authentication system collapse, and achieve the effect of solving insufficient security and safe and reliable Internet services

Active Publication Date: 2017-09-15
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once the public key of the CA center is impersonated, or the private key of the CA center is lost, the entire certification system will collapse

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security and trust processing method and device
  • Security and trust processing method and device
  • Security and trust processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] figure 1 Is a flowchart of a security trust processing method provided by an embodiment of the present invention; figure 2 It is a network architecture diagram to which the security trust processing method provided by the embodiment of the present invention is applicable. The specific security trust processing method steps are as follows:

[0023] Step S101: A node in the peer-to-peer network calculates a first hash value according to the message transmitted in the peer-to-peer network, the first random number, and the historical hash value.

[0024] Such as figure 2 As shown, the first node, the second node, the third node, and the fourth node constitute a peer-to-peer network (Peer to Peer, P2P). This is only a schematic description, and does not limit the specific form of the peer-to-peer network, nor does it limit the Wait for the number of nodes in the network. Each node is peer-to-peer in a peer-to-peer network, and their respective messages can be synchronized. Eac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a security and trust processing method and device. The method comprises the steps that a node in a peer-to-peer network calculates a first Hash value according to a message transmitted in the peer-to-peer network, a first random number and a historical Hash value; if the first Hash value is smaller than a threshold value, the node sends the first random number, the first Hash value and a first timestamp to other nodes in the peer-to-peer network, wherein the first timestamp represents the sending time of the node; and the node stores the message transmitted in the peer-to-peer network. According to the method, a brand-new decentralized Internet security mechanism is achieved, public keys are distributed in a decentralized distributed recording mode, the new Internet security and trust mechanism is constructed on the basis of the public key distribution mode without depending on any third-party organization or person, the problem that an existing Internet security and trust mechanism is not secure enough is solved, and secure and reliable Internet services are provided for users.

Description

Technical field [0001] The embodiments of the present invention relate to the field of communication technology, and in particular to a method and device for processing security trust. Background technique [0002] Public key encryption, also known as asymmetric (key) encryption (public key encryption), belongs to the second-level discipline of network security under communication technology. It refers to a pair of unique keys (that is, public key and private key). Key) encryption method. It solves the issue and management of keys and is the core of current commercial cryptography. In the public key encryption system, the private key is not disclosed, and the public key is disclosed. [0003] The public key encryption system solves this problem to a certain extent. Each user generates a pair of keys: public key and private key. When you want to communicate with the other party, send your public key to the other party. In order to prove your identity, you first sign the sent in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/062H04L67/1074
Inventor 田新雪马书惠
Owner CHINA UNITED NETWORK COMM GRP CO LTD