Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for constructing trusted node network

A node network and node technology, applied in the system and system field of building a trusted node network, can solve the problems of complex management and application, data forgery and tampering, and increase maintenance costs, and achieve low management and application costs and strong scalability. and flexibility, low management costs

Active Publication Date: 2018-12-28
JIANGSU FEIBO SOFTWARE TECH
View PDF7 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Security risks, opaque data concentration, not conducive to the supervision of supervisory agencies, there are risks such as data forgery and tampering
In the case that the credentials are managed by the certificate authority and the authority center, there are security risks such as malicious leakage of the credentials
[0010] Management and application are complex, how do certificate authorities and authority centers confirm the identity of unfamiliar entities when distributing credentials, and information is highly concentrated, which increases maintenance costs and makes management and application inconvenient; based on the above technical problems, a fault-tolerant, resistant A distributed trust system jointly maintained by attacking and anti-collusion node groups and a decentralized node access system and method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for constructing trusted node network
  • System and method for constructing trusted node network
  • System and method for constructing trusted node network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] Embodiment 1: see figure 1 , a system for building a trusted node network, the system includes a block chain management module, a node management module and a node identification module;

[0045] The blockchain management module is responsible for the management of node member information on the blockchain, that is, reading, writing, and checking the node information of the blockchain, as well as the management of the node's blockchain read and write authority; the node management module is responsible for the node members on the blockchain The joining, exiting, node network member information management, etc.; the node identification module is responsible for identifying the credibility of other nodes on the blockchain communicating with the node.

[0046] The details of the node network are as follows. The trust system of the trusted node network is jointly established and maintained by the node group through blockchain technology. The blockchain system is composed of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a system for constructing a trusted node network. The system comprises a block chain management module, a node management module and a node identification module. Block chainmanagement module is responsible for the management of node member information on the block chain, that is, read, write, look up the node information of the block chain, as well as the read and writeprivileges management of the node block chain; the node management module is responsible for the joining and exiting of the node members on the block chain and the information management of the node network members. The node authentication module is responsible for authenticating the trustworthiness of other nodes on the block chain communicating with the node. The technical scheme is a decentralized trust system and peer-to-peer identity authentication mechanism based on block chain and public key technology, which is used to construct a trusted and controlled node network, and solve the security problems of single point failure, DoS attack, forgery and tampering in the centralized mechanism. There is no centralized trust and authority center in the technical scheme. What the new technical scheme establishes is a decentralized, distributed trust system and admittance mechanism maintained by the network node group.

Description

technical field [0001] The invention relates to a system, in particular to a system method for building a trusted node network, and belongs to the technical field of trusted networks. Background technique [0002] When a node joins the network, it is often necessary to identify whether it is credible. The usual method is to conduct credential identification based on the established trust system. The establishment of a trust system relies on a third-party authority, and the commonly used authentication methods are divided into two categories, namely account-based authentication methods and certificate-based authentication methods. [0003] If the account-based authentication method is adopted, the node submits its own credential information including user name and password to the authority center when joining the network, and the authority center compares with the account information stored in its own database to see if they match. [0004] If the certificate-based credentia...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L63/08H04L63/10
Inventor 邵官阁龚康莉
Owner JIANGSU FEIBO SOFTWARE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products