Authentication certificate generation method based on block chain

A certificate generation and blockchain technology, applied in user identity/authority verification, digital transmission systems, electrical components, etc., can solve problems such as malicious attacks, attacks, and man-in-the-middle attacks, to ensure consistency, improve stability, and verify Effect of increased speed and communication speed

Inactive Publication Date: 2018-09-07
ZEU CRYPTO NETWORKS INC
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, authentication certificates are widely used in the Internet and e-commerce fields. The traditional method of generating authentication certificates is to establish a centralized certificate authentication center based on public key infrastructure. At

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication certificate generation method based on block chain
  • Authentication certificate generation method based on block chain
  • Authentication certificate generation method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] According to the Byzantine fault tolerance mechanism, in the certificate blockchain system, if F certificate nodes are attacked or fail, at least 3F+1 certificate nodes must exist in the system to ensure the certificate blockchain system normal operation; that is to say, in the authentication certificate blockchain system, at least four nodes must exist to form a complete authentication certificate blockchain. If any authentication certificate node is attacked or fails, as long as the number is less than two-thirds of all nodes in the system, the normal operation of the authentication certificate blockchain system can be guaranteed according to the Byzantine fault tolerance mechanism. After the abnormal node returns to normal, according to the synchronization mechanism of the authentication certificate system, a synchronization request will be made to the remaining authentication certificate nodes to obtain a complete authentication certificate blockchain. This ensures ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an authentication certificate generation method based on a block chain. The method comprises the following steps: (1) performing, by an certificate authentication center node, hash mapping on a received request to obtain bit arrays, sending the bit arrays to other certificate authentication center nodes, and performing, by each node, 2/3 intersection operation on all received bit arrays; (2) randomly selecting a block building node according to a polling scheduling algorithm, constructing a block by using request data corresponding to a common intersection, and broadcasting the block to the other nodes; (3) verifying, by each node, the newly built block, then signing a verification result with an own private key, and broadcasting the verification result to the othernodes; (4) performing, by each node,verification and calculation on the received verification result to obtain a voting set, then signing the voting set and broadcasting the voting set to the other nodes; and (5) performing, by each node,verification and summarization on the received voting sets of the other nodes, and determining whether to add the block to the block chain after the consensus operation. By using the method of the invention, multiple nodes perform mutual verification, so that the robustness of the system can be improved, and when a certain node is attacked, the consistency andintegrity of certificate generation are not affected.

Description

technical field [0001] The invention relates to a method for generating an authentication certificate, in particular, using block chain technology to generate the authentication certificate. Background technique [0002] At present, authentication certificates are widely used in the Internet and e-commerce fields. The traditional method of generating authentication certificates is to establish a centralized certificate authentication center based on public key infrastructure. Attacks, such as maliciously attacking a CA center, forging authentication certificates to achieve man-in-the-middle attacks, etc.; in order to cope with various threats and challenges, the method of generating authentication certificates also needs to be improved. [0003] The main characteristics of blockchain technology are distributed and non-tamperable. The results are finally confirmed through the consensus mechanism and finally recorded in the block; therefore, the use of blockchain technology to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06H04L29/08
CPCH04L9/3236H04L9/3247H04L9/3263H04L63/0823H04L67/1097
Inventor 蔡维德
Owner ZEU CRYPTO NETWORKS INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products