A chip computing method based on edge trusted cryptography technology

A computing method and cryptography technology, applied in the field of chip computing based on edge trusted cryptography technology, can solve the problems of forgery, alteration, damage and other problems of micro-cloud

Inactive Publication Date: 2019-01-29
杭州云岛科技有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If hackers control the micro-cloud center of mobile edge computing;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A chip computing method based on edge trusted cryptography technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Attached below figure 1 And embodiment will further illustrate technical scheme of the present invention.

[0020] The chip computing method based on edge trusted cryptography technology includes the following steps:

[0021] First design and manufacture a cryptographic algorithm chip 1 including ECC, AES, Hash,

[0022] The cryptographic algorithm chip 1 includes X digital signature technology, Y digital authentication technology, and Z digital authentication technology;

[0023] The steps required to complete the algorithm are realized, including: S1 genesis block digital signature step, S2 superposition block digital signature step, S3 ledger data chain formation step, S4 consensus ledger Merkle hash tree digital authentication step, S5 customer hash public key ID digital authentication steps.

[0024] 2 is the schematic representation of step S1 of the digital signature of the genesis block, including making a data block of the root of trust in the micro-cloud ce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a chip computing method based on the edge trusted cryptography technology, and belongs to the technical field of blockchain. The method includes the following steps: firstly designing a cryptographic algorithm chip including ECC, AES and Hash, wherein the chip includes a digital signature technology, a digital certification technology, and a digital authentication technology; steps required to complete the algorithm, including: a creation block number signature step, an overlay block digital signature step, a ledger data chain formation step, a Merkle hash tree digitalcertification step of consensus ledger, a customer hash public key ID digital authentication step. The chip computing method based on the edge trusted cryptography technology can realize correspondingfunctions at low cost and high efficiency.

Description

technical field [0001] The invention belongs to the technical field of block chain, and specifically relates to a chip computing method based on edge credible cryptography technology. Background technique [0002] People's Posts and Telecommunications Publishing House published "Key Technology and Implementation of Trusted Cloud Security" in June 2010, which disclosed a "trusted cryptography technology"; trusted cryptography technology includes trusted cryptography random Digital generation technology, trusted cryptography symmetric encryption / decryption technology, trusted cryptography asymmetric encryption / decryption technology, trusted cryptography fusion verification technology, trusted cryptography electronic signature technology, trusted cryptography certificate authentication technology, Letter cryptography electronic authentication technology. [0003] The vigorous development of blockchain technology has given space for trusted cryptography to keep pace with the ti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3247H04L9/3236
Inventor 李虹
Owner 杭州云岛科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products