Block chain-based trusted data source management method, signature equipment and verification equipment

A management method and data source technology, which is applied in the field of signature equipment, verification equipment, and trusted data source management, can solve the problems of not being as high as the blockchain, being peeped, and intercepted, etc., to achieve non-repudiation and strong applicability sex, efficiency-enhancing effects

Pending Publication Date: 2021-10-12
SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The centralized asymmetric key management method has the following shortcomings: (1) The password distribution process, especially the private key distribution process, has the possibility of being peeped and intercepted
(2) The centralized password server has the possibility of being artificially controlled and tampering with the data stored in the server, and its credibility is not as high as that of the blockchain

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain-based trusted data source management method, signature equipment and verification equipment
  • Block chain-based trusted data source management method, signature equipment and verification equipment
  • Block chain-based trusted data source management method, signature equipment and verification equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] In order to make the purpose, technical solution and advantages of this specification clearer, the technical solution of this application will be clearly and completely described below in conjunction with specific embodiments of this specification and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in the description, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts fall within the protection scope of the present application.

[0062] The key (including public key and private key) of the asymmetric cryptographic algorithm is managed in a centralized way, and a cryptographic server or a cryptographic service cluster is usually responsible for the generation, storage and distribution of the asymmetric key pair. The basic process of centralized asymmetric key management is as follows: (1) ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a block chain-based trusted data source management method, signature equipment and verification equipment. The method comprises the steps: carrying out encryption of issued data through a private key, and forming a digital signature, wherein the private key and a public key corresponding to the private key are generated by a data source end; and sending the data and the digital signature to a verification end, so that the verification end obtains a public key in a block chain to verify the digital signature, and determines whether the data is trusted. According to the block chain-based trusted data source management method provided by the embodiment of the invention, the data source end automatically generates the private key and the public key of an asymmetric cryptography algorithm, the data source end automatically stores the private key for later use, disclosure is not needed, the data source end only needs to disclose the public key, and the risks that the private key is peeped and intercepted in the transmission process are avoided.

Description

technical field [0001] This application relates to the technical field of block chain, and in particular to a trusted data source management method, signature device and verification device based on block chain. Background technique [0002] In the field of information communication, information may be subject to various attacks such as theft, tampering, forgery, and replay at any time, which has become a bottleneck in the construction of an information society. At the same time, the existence of the above-mentioned various attacks has also become a reason for denial. In order to prevent information from being illegally accessed, people often take measures such as limiting IP addresses, limiting domain names, and using virtual private networks (Virtual Private Network, VPN) to prevent information from being illegally stolen; Encryption algorithms such as symmetric encryption) to prevent information from being illegally stolen. [0003] The management of the private key in t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06G06F21/60G06F21/64
CPCH04L63/0876H04L9/3247H04L63/0442H04L63/06G06F21/602G06F21/64
Inventor 孙长杰黄镇国李照川王伟兵樊继硕郭亚琨万立华董晨晨
Owner SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products