A system and method for credible authentication of container images based on blockchain technology

A blockchain and mirroring technology, applied in the cloud-native field, can solve problems such as dependence, hidden dangers of mirroring security, and the inability to guarantee that it will not be tampered in the middle

Active Publication Date: 2021-08-20
成都道客数字科技有限公司
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0030] The technical problem to be solved by the present invention is that all existing image trust guarantee mechanisms are more or less defective, such as relying on centralized servers, etc. In the existing container image distribution technology, it is impossible to guarantee that the image in the image warehouse is the original image. The original version uploaded by the author cannot be guaranteed not to be tampered with in the middle. If it is tampered with, it will bring about hidden dangers of image security and intellectual property issues. The container image signature technology still relies on centralized authentication, and there are still risks. This system proposes a A blockchain-based decentralized trusted authentication mechanism to strengthen and solve image security authentication. The present invention provides a system for container image trusted authentication based on blockchain technology. The image publisher calculates the value of the image on the local computer Digital signature, and then write the image trusted authentication information including the digital signature into the trusted authentication component based on blockchain technology. The distributed cryptographic algorithm on the blockchain can ensure that no forgery will be made in the process , so publishers can safely share images on public mirror warehouses to solve the defects caused by existing technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A system and method for credible authentication of container images based on blockchain technology
  • A system and method for credible authentication of container images based on blockchain technology
  • A system and method for credible authentication of container images based on blockchain technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] In order to make the technical means, creative features, goals and effects achieved by the invention easy to understand, the technical solutions in the embodiments of the present invention are clearly and completely described below in conjunction with specific illustrations. Obviously, the described embodiments are the embodiment of the present invention. Some examples, but not all examples.

[0075] Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0076] It should be noted that the structures, proportions, sizes, etc. shown in the drawings attached to this specification are only used to match the content disclosed in the specification, for those who are familiar with this technology to understand and read, and are not used to limit the implementation of the present invention. Limiting conditions, so there is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system and method for credible authentication of container images based on blockchain technology. The system includes image signature registration components, decentralized image trusted authentication components, image signature verification components, and image warehouses; the method includes: Step 1: The original author uploads the image to the image signature registration component, and the image signature registration component calculates the image author information, digital signature, image name, and image ID based on the image and integrates them into trusted authentication information, then writes the image to the decentralized image In the trusted authentication component, the mirror image and trusted authentication information are combined into a smart contract and written into the blockchain network, and the mirror image is uploaded to the mirror warehouse; Step 2: The downloader downloads the mirror image from the mirror warehouse, and performs digital signature calculation on the mirror image , and obtain the image and digital signature from the decentralized image trusted authentication component; Step 3: Compare and verify the two digital signatures, if they are the same, allow the image to be used, if not, deny the image to be used.

Description

technical field [0001] The present invention relates to the field of cloud native, in particular to a system and method for credible authentication of container images based on block chain technology. Background technique [0002] In the cloud-native field, application development and application deployment based on container technology need to be based on container images downloaded from remote locations, but the credibility authentication of downloaded images is an important security issue, as well as an issue of intellectual property protection. , At present, it is necessary to solve the problem of how to prevent the image from being tampered with after the image is uploaded to the server and when a user downloads and uses the image. Therefore, this patent application proposes a decentralized technology based on blockchain smart contract technology , to authenticate the container image. This method can solve the above problems well. The same technology can also perform co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06H04L9/32
CPCH04L67/10H04L67/1095H04L63/08H04L67/1097H04L9/3247H04L9/50
Inventor 潘远航颜开张潇徐俊杰
Owner 成都道客数字科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products