Security and trust processing method and device
A processing device and processing method technology, applied in the field of communication, can solve problems such as loss and authentication system collapse, and achieve the effect of solving insufficient security and safe and reliable Internet services
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] figure 1 Is a flowchart of a security trust processing method provided by an embodiment of the present invention; figure 2 It is a network architecture diagram to which the security trust processing method provided by the embodiment of the present invention is applicable. The specific security trust processing method steps are as follows:
[0023] Step S101: A node in the peer-to-peer network calculates a first hash value according to the message transmitted in the peer-to-peer network, the first random number, and the historical hash value.
[0024] Such as figure 2 As shown, the first node, the second node, the third node, and the fourth node constitute a peer-to-peer network (Peer to Peer, P2P). This is only a schematic description, and does not limit the specific form of the peer-to-peer network, nor does it limit the Wait for the number of nodes in the network. Each node is peer-to-peer in a peer-to-peer network, and their respective messages can be synchronized. Eac...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


