Unlock instant, AI-driven research and patent intelligence for your innovation.

Distributed time authentication method and system based on block chain

A time authentication and distributed technology, applied in the direction of time division multiplexing system, transmission system, digital transmission system, etc., can solve the problems of hidden risks, low security, and inability to independently verify

Active Publication Date: 2019-12-10
涂先锋
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. It is necessary to unilaterally trust the timestamp authentication service provider. Users themselves cannot participate in the authentication process, nor can they independently verify
[0004] 2. The verification process is cumbersome, especially when legal effects are required, and the efficiency and cost are high
[0005] 3. There are hidden risks and low security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed time authentication method and system based on block chain
  • Distributed time authentication method and system based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0050] 1. The system sets the time resolution to t r =1ms, the system sets the authentication basic time unit t s = 1s, the system determines the time transmission error t according to the network transmission situation e =50ms, the system specifies the Internet time server NIST, and the system specifies the Internet time synchronization protocol NTPv4 protocol.

[0051] 2. The system-related rules are defined as follows:

[0052] System Rules R convenor : Except that the generation node of the genesis block is designated by the system, the registration identification node at each moment T is the generation node S of the previous block T-1 , if the block does not respond by T-600ms, T-2t s Block generation node S at time T-2 As a registration identification node. If there is still no response at T-950ms, then wait until T+950ms, and follow the steps of T+950ms at this time.

[0053] The system's certification node registration and recruitment rules R sign : First, sort...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a distributed time authentication method and system based on a block chain. The system is composed of authentication nodes distributed on the Internet, the method comprises thefollowing steps: according to time obtained by synchronizing a system specified Internet time server NST and an Internet time synchronization protocol NTP by taking a given time resolution as tr. generating an authentication data block at each moment T for the to-be-authenticated data submitted by the user according to a block generation rule in a given basic time unit ts, and chaining the blockto complete data time authentication at the moment T. According to the invention, the blockchain technology is applied to time authentication, and a verifiable proof that specific data exists at a certain specific time is provided through a distributed, consensus and non-randomly-tampered account book record, so that a transparent, public, credible, simple, convenient and efficient time authentication method and system are established.

Description

technical field [0001] The present invention relates to the technical field of time authentication, in particular to a blockchain-based distributed time authentication method and system. Background technique [0002] In many application scenarios, such as in the process of e-commerce transactions, we need a verifiable proof method and system to prove that a piece of data existed before a certain time. To this end, people have designed a timestamp authentication method to provide timestamp authentication services, providing users with an electronic evidence to prove the generation time of some of the user's data. In practical applications, it can be used in various aspects including e-commerce and financial activities, especially the "non-repudiation" service that can be used to support public key infrastructure. According to different authentication effects, there are generally two ways to establish this authentication service, one is self-created timestamp, and the other i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04J3/06H04L9/08H04L9/32H04L29/06H04L9/06
CPCH04J3/0638H04L9/0643H04L9/0869H04L9/3247H04L63/08
Inventor 涂先锋
Owner 涂先锋
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More