Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Distributed network node authentication method based on chip

A distributed network and authentication method technology, applied in the field of chip-based distributed network node authentication, can solve the problems of key information cracking, easy to be cracked, and randomness cannot be achieved

Active Publication Date: 2020-10-23
上海朝夕网络技术有限公司
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the random numbers in the distributed network are simulated by computer software programs, one cannot achieve true randomness, and the other is easy to be cracked
In the symmetric key authentication method, the symmetric key is uniformly issued by the authentication management center, and there are many participating links, which can easily lead to the key information being cracked.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed network node authentication method based on chip
  • Distributed network node authentication method based on chip
  • Distributed network node authentication method based on chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the purpose, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and examples. It should be understood that the specific examples described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0024] The application object of the distributed network node authentication method in the embodiment of the present invention is firstly described below, and the object is preferably a distributed network architecture. Furthermore, the distributed network in this embodiment is formed by interconnecting computer systems distributed in different locations, there is no central node in the network, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The technical scheme of the invention discloses a distributed network node authentication method based on an encryption chip. The method comprises the following steps: a first node and a second node respectively generate a public and private key pair and a random number; the first node and the second node exchange random numbers and public key information with each other; the first node receives the second random number, processes the second random number by using the first private key and the second public key to obtain a first encrypted signature and transmits the first encrypted signature to the second node; the first node receives the second encrypted signature by using the first private key and the second public key to decrypt and obtain verification information; and if the verification results of the first node and the second node are consistent, the encrypted hardware number of the current node is bound with the current node to complete node verification. According to the distributed network node authentication method and system based on the chip provided by the invention, a hardware random number and information encryption combined method is adopted, so that the security ofidentity authentication information between different nodes in a distributed network is greatly improved.

Description

technical field [0001] The invention relates to the technical field of distributed network node security authentication, in particular to a chip-based distributed network node authentication method. Background technique [0002] Distributed technology is a technology that combines distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and other computer technologies, and is widely used in various industries such as finance and e-commerce. In the distributed network system, in the process of chaining and querying data blocks, it is often necessary to transfer some data in the distributed network system, such as chaining information, query requests, etc. Since the blockchain is a decentralized distributed database, it does not rely on any centralized server, but consists of tens of thousands of "small servers" and "nodes". The more and more nodes are distributed, the more decentralized the distributed network will be, and the safer an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/30H04L9/32
CPCH04L63/083H04L9/0869H04L9/0863H04L9/3247H04L9/30H04L63/0442
Inventor 王沁李庆华李汝佳汪晓明
Owner 上海朝夕网络技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products