Method for exchanging data between nodes and establishing node digital identity

A digital identity and data exchange technology, applied in the computer field, can solve the problems of unable to prevent other file system nodes from writing data, unable to prevent other file system nodes from reading data, etc., to ensure security and prevent reading and writing data Effect

Inactive Publication Date: 2022-01-14
山东爱城市网信息技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present application provides a method for exchanging data between nodes and establishing a digital identity for nodes, which is used to solve the problem of controlling data write and read permissions through the IPFS file system in the prior art. The user of the file system node has read and write permissions to the file, but cannot prevent other file system nodes from writing data to the current file system node, nor can it prevent other file system nodes from reading the data of the current file system node

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for exchanging data between nodes and establishing node digital identity
  • Method for exchanging data between nodes and establishing node digital identity
  • Method for exchanging data between nodes and establishing node digital identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0060] The technical solutions provided by various embodiments of the present application will be described in detail below in conjunction with the accompanying drawings.

[0061] figure 1 A schematic flowchart of a data exchange method between nodes provided in Embodiment 1 of this specification. In this embodiment of this specification, the current...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for exchanging data between nodes. The method comprises the following steps: when an opposite alliance security file system node reads or writes data to a current alliance security file system node, digital identity information, sent by the opposite alliance security file system node, of the opposite alliance security file system node is received; if the node digital identity verification module of the current alliance security file system node finds out the digital identity label of the opposite alliance security file system node in the pre-cached digital identity label, the digital signature of the node of the opposite-side alliance security file system is decrpted by using a pre-cached public key of the node of the opposite-side alliance security file system through a node digital identity verification module to obtain verification information corresponding to the digital signature of the node of the opposite-side alliance security file system; and when the digital identity information of the node of the consortium security file system of the opposite side is verified to be correct, a task of reading or writing data by the node of the consortium security file system of the opposite side is performed.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a method for exchanging data between nodes and establishing node digital identities. Background technique [0002] Blockchain is a peer-to-peer secure and credible value storage and delivery network system with broad development prospects. The security and trustworthiness of the blockchain depend to a large extent on the characteristics of the blockchain consensus mechanism, that is, each peer node has the same ledger, performs the same logical calculations, and stores the same content. It is precisely because of this feature that the blockchain generally requires a large storage space, because each node needs to store the same data. Even for a node, it takes a lot of space, because the node needs to record the data of the entire network. In particular, the public chain is a global network, and with the continuous growth of transaction business, the storage space re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/46G06F21/60G06F21/62G06F21/64G06F16/27
CPCG06F21/6227G06F21/602G06F21/46G06F21/64G06F16/27
Inventor 孙长杰李照川王伟兵肖守明
Owner 山东爱城市网信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products