Trust propagation method and system in Internet node and related products
A technology of trust communication and Internet, applied in the Internet field, it can solve the problems of insufficient reliability, poor security, and low authentication efficiency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0043] This embodiment discloses a trust propagation method in Internet nodes, such as figure 1 as shown, figure 1 A flow chart of a trust propagation method in an Internet node provided by an embodiment of the present application, the trust propagation method in an Internet node includes:
[0044] S101. Determine a second Internet node in the Internet system that initiates communication to the first Internet node, and establish an authentication connection between the first Internet node and the second Internet node, so as to obtain a neighbor credibility certificate in the first Internet node.
[0045] S102. Determine whether the first Internet node has performed trust authentication on the second Internet node according to the neighbor credibility certificate; if not, determine a trust propagation path between the first Internet node and the second Internet node.
[0046] S103. Determine other Internet nodes located on the trust propagation path and adjacent to the first I...
Embodiment 2
[0068] Based on the trust propagation method in the Internet node described in Embodiment 1 of the present application, the embodiment of the present application also provides a trust propagation device in the Internet node, such as figure 2 as shown, figure 2 A schematic structural diagram of a trust propagating device 20 in an Internet node provided for the embodiment of the present application, the trust propagating device in the Internet node includes:
[0069] The first program unit 201 is configured to determine the second Internet node in the Internet system that initiates communication to the first Internet node, and establish an authentication connection between the first Internet node and the second Internet node, so as to obtain the Proof of neighbor's credibility;
[0070] The second program unit 202 is used to judge whether the first Internet node has carried out trust authentication on the second Internet node according to the neighbor credibility certificate; i...
Embodiment 3
[0091] This application also provides a block chain system, such as image 3 as shown, image 3 A schematic structural diagram of a block chain system provided for the embodiment of the present application, the block chain system includes: a plurality of block chain nodes, each block chain node is provided with a trust propagation device in the Internet node, the Internet node Zhongxin dissemination devices include:
[0092] The first program unit is configured to determine a second Internet node in the Internet system that initiates communication to the first Internet node, and establish an authentication connection between the first Internet node and the second Internet node, so as to obtain the first Internet node Proof of neighbor credibility in an Internet node;
[0093] The second program unit is configured to judge whether the first Internet node has performed trust authentication on the second Internet node according to the neighbor credibility certificate; if not, d...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


