Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User trust negotiation establishment method based on two-layer blockchain in heterogeneous alliance system

A technology of trust negotiation and establishment method, which is applied in the direction of transmission system, digital transmission system, user identity/authority verification, etc. It can solve the problems of tampering, failure to consider, malicious attack and other problems stored in the data center, and achieve the goal of preventing malicious users from registering Effect

Active Publication Date: 2018-12-07
成都云裳科技有限公司
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] (1) From the perspective of the analysis environment, they are all limited to a specific network system environment, and the definition of heterogeneous environment is relatively narrow, which does not take into account the need to share data between different systems such as e-commerce, education, and finance in the actual environment And the formed heterogeneous network system, this situation belongs to the generalized heterogeneous network environment
[0009] (2) From the perspective of the analysis objects, they all consider equipment security and data security, ignoring the security at the user level, and user identity management and behavioral trustworthiness are the main factors and links that cause security problems. my country's digital certificate-based , ID cards, biometrics and other technologies, and have established their own identity management and service systems in different fields such as government, finance, banking, and social networks, but there are still various identity management platforms, and the data between platforms is isolated and scattered; cross-domain Lack of credible evaluation of users; difficulties in monitoring the behavior of polymorphic cross-domain network entities, etc.
[0010] (3) Finally, from the perspective of solutions, neither the layered security architecture nor the security management technology for data sources can ensure security in a real sense, and the storage of data is managed in a centralized manner. The standardized management method faces information security issues such as malicious attacks, central node failure, and malicious tampering of stored data in the data center.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User trust negotiation establishment method based on two-layer blockchain in heterogeneous alliance system
  • User trust negotiation establishment method based on two-layer blockchain in heterogeneous alliance system
  • User trust negotiation establishment method based on two-layer blockchain in heterogeneous alliance system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0050] In the prior art, there are one-sidedness and limitations in the analysis of heterogeneous networks. First of all, from the perspective of the analysis environment, they are all limited to a specific network system environment, and the definition of heterogeneous environment is relatively narrow, which does not take into account the actual environment, such as e-commerce, education, finance, and other systems that may need to share data. The heterogeneous network system formed, this situation belongs to the generalized heterogeneous network environment. Secondly, from the point of view of the analysis object, they a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of network information processing, and discloses a user trust negotiation establishment method based on a two-layer blockchain in a heterogeneous alliancesystem. Alliance users of M alliance systems perform initial voting on the located alliance systems according to multiple dimensions such as the social influence and quality of service to select f users to serve as trusted nodes, and new blocks are signed together; the remaining users act as audit nodes to check whether each signed new block is true and valid in turn, wherein f satisfies that 3f+1is less than or equal to M; one or more of the f authorized representative nodes miss signing the new blocks to generate wrong blocks, and a client automatically removes a vote; and the alliance users have digital certificates that can represent the true identity and quote the digital certificates at the head of each transaction data. The invention provides a new idea for cross-domain user management and lays a foundation for the arrival of web3.0 based on the characteristics of blockchain decentralization.

Description

technical field [0001] The invention belongs to the technical field of network information processing, and in particular relates to a method for establishing user trust negotiation based on a layer-2 block chain in a heterogeneous alliance system. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: [0003] With the advent of web2.0, my country's telecommunications, finance, science and education, transportation and other network systems are booming, breaking through the network application forms in traditional fields, and the basic and overall role of the network in national economic life is increasing. At the same time, a large number of devices such as sensors, embedded products, and consumer electronics are involved, and the scale of the network is expanding day by day. Systems are no longer isolated and dispersed, and gradually present complex characteristics of heterogeneity and polymorphism. Many technical...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L12/883H04L29/08H04L49/9015
CPCH04L9/3236H04L9/3247H04L9/3297H04L49/9015H04L67/1097
Inventor 张仕斌杨敏刘宁张航赵杨甘建超杨晨
Owner 成都云裳科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products