Blockchain network-based certificate issuance method, related equipment and media
A certificate issuance and blockchain technology, applied in the field of certificate issuance devices and computer storage media based on blockchain network, can solve the problems of client identity certificate tampering, low security and reliability of identity certificate, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0058] In an implementation manner, if the number of the first voting results is greater than the number of the second voting results, it may be determined that the certificate application notification has passed the consensus; otherwise, it may be determined that the certificate application notification has not passed the consensus. In one embodiment, if the number of the first voting result is greater than the number threshold, it can be determined that the certificate application notification has passed the consensus; otherwise, it can be determined that the certificate application notification has not passed the consensus; Requirements setting. In one embodiment, if the ratio between the number of first voting results and the number of consensus nodes in the blockchain network (that is, the number of total voting results) is greater than a preset value, it can be determined that the certificate application notification has passed the consensus ; Otherwise, it can be determ...
specific Embodiment approach
[0076] In the specific implementation process, if the registration success notification returned by the consensus node is received, it can be determined that the consensus node has registered the node information of the trusted node on the blockchain, and agreed to the trusted node to activate the certificate issuance. Therefore, after receiving the registration success notification returned by the consensus node, the trusted node can start the certificate issuance service in the trusted execution environment. In addition, the trusted node can also load the root certificate through the certificate signing service in the trusted execution environment, so that the root certificate can be used to issue the identity certificate for the client later. Among them, in the trusted execution environment, the specific implementation method of loading the root certificate through the certificate signing service is as follows:
[0077] First, the trusted node can generate a key pair using ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



