Name-based trust method in named data network

A technology for naming data networks and names. It is used in digital transmission systems, secure communication devices, user identity/authority verification, etc. It can solve the problems of low efficiency of domain-level identity authentication, and achieve the effect of high authentication efficiency and accurate authentication efficiency.

Active Publication Date: 2019-11-01
SOUTH CENTRAL UNIVERSITY FOR NATIONALITIES
View PDF9 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The technical problem to be solved by the present invention is to provide a name-based trust method in a named data network aiming at the low efficiency of current domain-level identity authentication in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Name-based trust method in named data network
  • Name-based trust method in named data network
  • Name-based trust method in named data network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0045] The name-based trust mechanism scheme design mainly lies in two aspects: one is to verify the integrity of data, and the other is to quickly obtain trust. The data producer calls the signature algorithm provided by the information service entity to sign the data packet. After receiving the data packet, the data requester first calls the verification signature algorithm provided by the information service entity to verify the integrity of the data, and then authenticates the identity of the data producer , if the data producer comes from a legitimate domain, the data requester trusts the data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a name-based trust method in a named data network. The method comprises the following steps: identity authentication based on a block chain technology: a domain-level information service entity applying for registration to a block chain and creates a block, and the block comprising a domain name, a public key of the domain and public parameter information of the domain; after receiving the data packet, the user verifying the identity of the domain where the producer of the data packet is located by adopting a domain-level identity authentication method, the data packetbeing credible if the verification succeeds, and otherwise, discarding the data packet; judging data credibility: signing each data packet, and a receiver judging the integrity of the data packet by verifying the data signature; according to the domain-level identity authentication method, determining the identity of a producer, and if the data packet has integrity and is generated by the producerwith legal identity, a receiver trusting the data packet. The domain-level identity is authenticated by adopting the block chain technology, the authentication efficiency is high and accurate, and the credibility of the data packet is judged by utilizing the identity authentication scheme.

Description

technical field [0001] The invention relates to the research field of named data network infrastructure, in particular to a name-based trust method in the named data network. Background technique [0002] With the advancement and development of technology, the cost of computers has gradually decreased, and more ordinary people have computers. The application of the Internet is no longer limited to the use of certain supercomputer services. With the improvement of people's living standards and continuous changes in needs, The scope of application of the Internet is increasing, such as e-commerce and online news broadcasting. Some offline sales stores and traditional media have been greatly impacted. Internet information dissemination is fast, which is conducive to the timeliness of news. With the rapid development of the Internet, people pay more attention to the content on the Internet rather than the location of the content. The current Internet cannot meet the needs of pe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/08H04L63/123H04L9/3247H04L9/50
Inventor 朱容波王俊王德军夏荣
Owner SOUTH CENTRAL UNIVERSITY FOR NATIONALITIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products