Blockchain digital signature method and device based on distributed storage

A distributed storage and digital signature technology, which is applied in the field of computer communication, can solve the problems of easy theft of user information, poor security, and difficulty in verifying the integrity of files, etc.

Inactive Publication Date: 2020-09-18
盛唐威讯数媒科技(北京)有限公司
View PDF2 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Obviously, the security of this verification method is poor, and the third party can easily obtain the transmitted user name and password, and use this information to establish a connection with NAS (network access server, network access server) to obtain all resources provided by NAS
There are still some disad

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain digital signature method and device based on distributed storage
  • Blockchain digital signature method and device based on distributed storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] see figure 1 , a distributed storage-based blockchain digital signature method provided in Embodiment 1 of the present invention, such as figure 1 As shown, the method includes:

[0030] S101: The sending node generates a public key and private key pair; roles in the blockchain provided by this application include peer nodes (peers), orderers, client applications, administrators, and so on. The identities of these participants are encapsulated in digital certificates conforming to the X.509 standard, which determine their specific rights as participants in the network. Each identity is verifiable (that is to say, it must be a real identity), and these identities are authorized to receive the node membership distribution verification system. The system uses X.509 standard certificates as identities and adopts the traditional public key infrastructure (PKI) layered model.

[0031] S102: The sending node performs a hash operation on the identity data information to gene...

Embodiment 2

[0038] Corresponding to the blockchain digital signature method based on distributed storage provided in Embodiment 1 of the present invention, Embodiment 2 of the present invention also provides a blockchain digital signature device based on distributed storage. Please refer to figure 2 , is a schematic diagram of a distributed storage-based blockchain digital signature device provided according to an embodiment of the present invention, such as figure 2 As shown, the device includes:

[0039] A public key and private key generating unit 201, configured for the sending node to generate a public key and private key pair;

[0040] The digital signature generating unit 202 is used for the sending node to perform a hash operation on the identity data information to generate abstract information, and use the private key to process the abstract information to generate digital signature information;

[0041] The verification unit 203 is configured to broadcast the digital signat...

Embodiment 3

[0048] Embodiment 3 of the present application also provides a processor, the processor is used to run a program, wherein the distributed storage-based blockchain digital signature method is executed when the program is running.

[0049]It can be known from the above description of the implementation manners that those skilled in the art can clearly understand that the present application can be implemented by means of software plus a necessary general-purpose hardware platform. Based on this understanding, the essence of the technical solution of this application or the part that contributes to the prior art can be embodied in the form of software products, and the computer software products can be stored in storage media, such as ROM / RAM, disk , CD, etc., including several instructions to make a computer device (which may be a personal computer, server, or network device, etc.) execute the methods described in various embodiments or some parts of the embodiments of the presen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a blockchain digital signature method and device based on distributed storage. The method comprises the steps that a sending node generates a public key and private key pair; the sending node performs hash operation on the identity data information to generate summary information, and processes the summary information by using the private key to generate digital signature information; and the sending node broadcasts the digital signature information, the identity data information and the public key to a receiving node, so that the receiving node verifies the signature information through the public key. According to the method provided by the invention, the adopted digital signature technology is used for ensuring that the sent information is not tampered and ensuring that the integrity and consistency of user files are verified, and the security of the algorithm is improved for a relatively single rsa encryption algorithm.

Description

technical field [0001] The invention relates to the technical field of computer communication, in particular to a distributed storage-based block chain digital signature method and device. Background technique [0002] In general, before providing Internet services to registered users, registered users are required to log in with their accounts. In the prior art, when a user logs in, the user is required to provide a user name and a password (usually a password set by the user himself), and the user information is returned in plain text. Obviously, the security of this verification method is poor, and the third party can easily obtain the transmitted user name and password, and use this information to establish a connection with NAS (network access server, network access server) to obtain all resources provided by NAS . The login method in the prior art also has the following disadvantages. The identity verification is single and simple, for example, only the password and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/06H04L9/32H04L29/08
CPCH04L63/0442H04L9/0643H04L9/3247H04L67/1097H04L63/083
Inventor 田鹏邵周生吕聪曾真耿涛张晴
Owner 盛唐威讯数媒科技(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products