CN108989468A - A kind of trust network construction method and device - Google Patents
A kind of trust network construction method and device Download PDFInfo
- Publication number
- CN108989468A CN108989468A CN201811010526.2A CN201811010526A CN108989468A CN 108989468 A CN108989468 A CN 108989468A CN 201811010526 A CN201811010526 A CN 201811010526A CN 108989468 A CN108989468 A CN 108989468A
- Authority
- CN
- China
- Prior art keywords
- node
- common recognition
- trust network
- destination node
- environment information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1044—Group management mechanisms
- H04L67/1046—Joining mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Landscapes
- Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Theoretical Computer Science (AREA)
- Computer And Data Communications (AREA)
Abstract
The present invention provides a kind of trust network construction method and devices, this method comprises: the installation agent program on the destination node that the trust network is added in application;The first environment information of the destination node, and at least two first common recognition nodes that the first common recognition request for carrying the first environment information is sent in the trust network are obtained by the broker program;Using at least two first common recognitions node, judge whether the destination node is credible according to the first environment information that the first common recognition request carries;If so, in the trust network that the destination node is added to;If not, refusing the application that the trust network is added in the destination node.The device includes: to act on behalf of installation unit, request transmitting unit, node common recognition unit and network struction unit.This programme is able to ascend the credibility of constructed trust network.
Description
Technical field
The present invention relates to field of computer technology, in particular to a kind of trust network construction method and device.
Background technique
Block chain is substantially the database of a decentralization, can not be tampered based on institute's storing data on block chain
Characteristic, block chain are with a wide range of applications in fields such as finance, insurance, medical treatment.Block chain is being applied to specific business
It when scene, needs to construct trust network, each trusted node for including by trust network is total to the information of write-in block chain
Know, to determine whether the information in write-in block chain is credible.
Currently, for the node for needing to be added trust network, obtaining the environmental information of the node when constructing trust network
It is audited, if the environmental information of the node meets the requirement of trust network, which is added in trust network.
For the method for current building trust network, trust usually is added to application by manually or specifically auditing node
The environmental information of the node of network is audited, if manual examination and verification process is made a fault or is audited node and controlled by Virus,
The node that environmental information may be then unsatisfactory for trust network requirement is added in trust network, leads to the credible journey of trust network
Degree reduces.Therefore, the credibility by trust network constructed by existing trust network construction method is lower.
Summary of the invention
The embodiment of the invention provides a kind of trust network construction method and device, it is able to ascend constructed trust network
Credibility.
In a first aspect, the embodiment of the invention provides a kind of trust network construction methods, comprising:
The installation agent program on the destination node that the trust network is added in application;
The first environment information of the destination node is obtained by the broker program, and will carry the first environment letter
At least two first common recognition nodes that first common recognition request of breath is sent in the trust network;
Using at least two first common recognitions node, believed according to the first environment that the first common recognition request carries
Breath judges whether the destination node is credible;
If so, in the trust network that the destination node is added to;
If not, refusing the application that the trust network is added in the destination node.
Optionally,
The first environment information includes: the operating system version of the destination node, the version of the broker program, institute
State the application ring of the network protocol version of destination node, the trusted computation environment information of the destination node, the destination node
It is any one or more in border information and current time;
Wherein, the current time is to obtain the time of the environmental information, and the current time is by coordinating the world
When UTC calibrate.
Optionally,
It will be taken after the first environment information for obtaining the destination node by the broker program, and described
With the first environment information first common recognition request be sent in the trust network at least two first common recognition nodes it
Before, further comprise:
Hash operation is carried out to the first environment information by the broker program, obtains corresponding environment Hash
Value;
And it is described will carry the first environment information first common recognition request be sent in the trust network at least
Two first common recognition nodes, comprising:
At least two first that the first common recognition request for carrying the environment cryptographic Hash is sent in the trust network
Common recognition node.
Optionally,
At least two that the first common recognition request for carrying the first environment information is sent in the trust network
A first common recognition node, comprising:
Each node for including to the trust network in the form of broadcast, which is sent, carries the of the first environment information
One common recognition request;
At least two nodes that the first common recognition request is received within the preset waiting time are determined as institute
State the first common recognition node, wherein waiting time timing since at the time of sending the first common recognition request.
Optionally,
First ring that is described to utilize at least two first common recognitions node, being carried according to the first common recognition request
Border information judges whether the destination node is credible, comprising:
Each described first common recognition node is obtained respectively to the common recognition result of the destination node, wherein the common recognition
As a result the first environment information that is carried by the corresponding first common recognition node according to the first common recognition request and pre-
The white list that first sets and determine, determined if the first environment information is consistent with the information that the white list records described in
The common recognition result of destination node be it is credible, determined if the information that the first environment information is recorded with the white list is not inconsistent
The common recognition result of the destination node is insincere;
According to each common recognition got as a result, calculating the fiducial probability of the destination node by following formula;
Wherein, the m0Characterize the number of the first common recognition node;The m1Characterization determines the common recognition of the destination node
It as a result is the number of the believable first common recognition node;The k characterizes adjustment factor, and 0 k≤1 <;It is describedTable
It levies from m0M is selected in a node0-m1The number of combinations of a first common recognition node;
If the fiducial probability is greater than preset probability threshold value, determines that the destination node is credible, otherwise determine
The destination node is insincere.
Optionally,
The trust network construction method further comprises:
For each node that the trust network includes, a corresponding trigger value is preset;
For node described in each, random number is persistently calculated by Bayesian formula, when the calculated random number
When the trigger value corresponding equal to the node, the node is obtained by the broker program installed on the node
Second environment information, and request the second common recognition for carrying the second environment information to issue at least two in the trust network
A second common recognition node, described second carried using at least two second common recognition node according to the second common recognition request
Environmental information judges whether the node is credible, if it is judged that it is insincere for the node, then by the node from described
It is removed in trust network.
Second aspect, the embodiment of the invention also provides a kind of trust network construction devices, comprising: act on behalf of installation unit,
Request transmitting unit, node common recognition unit and network struction unit;
It is described to act on behalf of installation unit, for the installation agent program on the destination node that the trust network is added in application;
The request transmitting unit, for obtaining the mesh by the broker program for acting on behalf of installation unit installation
The first environment information of node is marked, and the first common recognition request for carrying the first environment information is sent to the trust network
In at least two first common recognition nodes;
The node common recognition unit, the first common recognition request for being sent using the request transmitting unit is received
It is described at least two first common recognition node, according to it is described first common recognition request carry the first environment information judgement described in
Whether destination node is credible;
The network struction unit, for the judging result according to node common recognition unit, if the destination node
It is credible, the destination node is added in the trust network, refuses the target if the destination node is insincere
The trust network is added in node application.
Optionally,
The request transmitting unit is sent in the execution first common recognition request that will carry the first environment information
In the trust network at least two first common recognition node when, be specifically used for:
Hash operation is carried out to the first environment information by the broker program, obtains corresponding environment Hash
Value, and first common recognition for carrying the environment cryptographic Hash is requested described in be sent in the trust network at least two
First common recognition node.
Optionally,
The request transmitting unit, each node for including to the trust network in the form of broadcast, which is sent, to be carried
The first common recognition request of the first environment information, and first common recognition will be received within the preset waiting time and asked
At least two asked the node is determined as the first common recognition node, wherein the waiting time is total from sending described first
Start timing at the time of knowing request.
Optionally,
The node common recognition unit, is specifically used for executing following steps:
Each described first common recognition node is obtained respectively to the common recognition result of the destination node, wherein the common recognition
As a result the first environment information that is carried by the corresponding first common recognition node according to the first common recognition request and pre-
The white list that first sets and determine, determined if the first environment information is consistent with the information that the white list records described in
The common recognition result of destination node be it is credible, determined if the information that the first environment information is recorded with the white list is not inconsistent
The common recognition result of the destination node is insincere;
According to each common recognition got as a result, calculating the fiducial probability of the destination node by following formula;
Wherein, the m0Characterize the number of the first common recognition node;The m1Characterization determines the common recognition of the destination node
It as a result is the number of the believable first common recognition node;The k characterizes adjustment factor, and 0 k≤1 <;It is describedTable
It levies from m0M is selected in a node0-m1The number of combinations of a first common recognition node;
If the fiducial probability is greater than preset probability threshold value, determines that the destination node is credible, otherwise determine
The destination node is insincere.
Optionally,
The trust network construction device further comprises: common recognition control unit;
The common recognition control unit, each described node for including for the trust network, presets one
A corresponding trigger value, and random number is persistently calculated by Bayesian formula, when the calculated random number is equal to described
Triggering command is sent to the request transmitting unit when the corresponding trigger value of node;
The request transmitting unit is further used for after receiving the triggering command, by installing on the node
The broker program obtain the second environment information of the node, and the second common recognition that will carry the second environment information is asked
Seek at least two second common recognition nodes issued in the trust network;
The node common recognition unit is further used for total using receive the request transmitting unit transmission described second
At least two second common recognitions node for knowing request, sentences according to the second environment information that the second common recognition request carries
Whether the node that breaks is credible;
The network struction unit is further used for the judging result according to node common recognition unit, if it is determined that knot
Fruit is that the node is insincere, then removes the node from the trust network.
The embodiment of the invention provides trust network construction method and devices, when trust network is added in destination node application
When, installation agent program on the target node obtains the first environment information of destination node by broker program, and will carry the
At least two first common recognition nodes that first common recognition request of one environmental information is sent in trust network, and then can use each
Whether a first common recognition node is credible to judge destination node according to the first environment information of the first common recognition request carrying, if sentenced
Disconnected result is that destination node is credible, and destination node is added in trust network, if it is judged that insincere for destination node
Then refuse the application that trust network is added in destination node.It can be seen that judging the whether believable process of destination node by trust
Multiple common recognition nodes in network are realized, are saved based on node credibility with higher of knowing together in trust network, and by multiple common recognitions
Point is common to determine whether destination node is credible, can be to avoid since manual examination and verification fault or single audit node are by Virus control
It makes and insincere node is added to the situation in trust network and is occurred, so as to promote the credible journey of constructed trust network
Degree.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is the present invention
Some embodiments for those of ordinary skill in the art without creative efforts, can also basis
These attached drawings obtain other attached drawings.
Fig. 1 is a kind of flow chart of trust network construction method provided by one embodiment of the present invention;
Fig. 2 is the flow chart of another trust network construction method provided by one embodiment of the present invention;
Fig. 3 is the schematic diagram of equipment where a kind of trust network construction device provided by one embodiment of the present invention;
Fig. 4 is a kind of schematic diagram of trust network construction device provided by one embodiment of the present invention;
Fig. 5 is the schematic diagram of another trust network construction device provided by one embodiment of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments, based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
As shown in Figure 1, this method may include following step the embodiment of the invention provides a kind of trust network construction method
It is rapid:
Step 101: the installation agent program on the destination node that trust network is added in application;
Step 102: obtaining the first environment information of destination node by broker program, and first environment information will be carried
At least two first common recognition nodes that first common recognition request is sent in trust network;
Step 103: using at least two first common recognition nodes, being sentenced according to the first environment information that the first common recognition request carries
Whether disconnected destination node is credible, if so, step 104 is executed, it is no to then follow the steps 105;
Step 104: in the trust network that destination node is added to, and terminating current process;
Step 105: the application of trust network is added in refusal destination node.
The embodiment of the invention provides a kind of trust network construction methods, when trust network is added in destination node application,
Installation agent program on the target node, the first environment information of destination node is obtained by broker program, and will carry first
At least two first common recognition nodes that first common recognition request of environmental information is sent in trust network, and then can use each
First common recognition node judges whether destination node is credible according to the first environment information that the first common recognition request carries, if it is determined that
As a result credible for destination node, destination node is added in trust network, if it is judged that insincere then for destination node
Refuse the application that trust network is added in destination node.It can be seen that judging the whether believable process of destination node by trust network
In multiple common recognition nodes realize, based on node credibility with higher of knowing together in trust network, and by multiple common recognition nodes
It is common to determine whether destination node is credible, it can be controlled to avoid due to manual examination and verification fault or single audit node by Virus
And insincere node is added to the situation in trust network and is occurred, so as to promote the credible journey of constructed trust network
Degree.
Optionally, on the basis of trust network construction method shown in Fig. 1, believed by the first environment that broker program is got
Breath includes the operating system version of destination node, the version of broker program, the network protocol version of destination node, destination node
Some or all of in trusted computation environment information, the application environment information of destination node and current time, wherein when current
Between refer to broker program obtain first environment information included by other each information time, and the current time by coordinate generation
(Coordinated Universal Time, UTC) is calibrated when boundary.
Broker program obtains the operating system version, network protocol version, trusted computation environment information, application of destination node
The first environment information of environmental information and current time and broker program itself version as destination node, and then the first common recognition
Node can be total to for many aspects such as operating system, network protocol, trusted computation environment, the application environments of destination node
Know, guarantees that common recognition result can more accurately reflect the ambient condition of destination node, and then can guarantee that trust network is added
Node credibility.
Wherein, using current time as a part of first environment information, it is ensured that included by first environment information
Other information reflection be destination node current ambient conditions, be further ensured that it is each first common recognition node to destination node into
The accuracy of row common recognition.In addition, using the version of broker program as a part of first environment information, it can be from the source of information
On ensure the safety of first environment information, be further ensured that the accuracy known together to destination node.
It should be noted that broker program independent operating on destination node, acquire the process of first environment information not by
The control of destination node, thereby may be ensured that broker program collected first environment information and destination node actual environment
It is consistent, and then guarantees whether each first common recognition node according to first environment information can accurately determine destination node credible,
Guarantee the safety of trust network.
Optionally, on the basis of trust network construction method shown in Fig. 1, step 102 obtains target by broker program
After the first environment information of node, Hash operation can be carried out to the first environment information got by broker program, obtained
Obtain environment cryptographic Hash corresponding with first environment information.Correspondingly, the first common recognition request is sent to trust network by step 102
In at least two first common recognition node when, can will carry environment cryptographic Hash first common recognition request issue in trust network
At least two first common recognition nodes.
Broker program needs after the first environment information of the destination node got according to the first environment letter got
Breath generates the first common recognition request, specifically can carry out Hash operation to first environment information and obtain corresponding environment cryptographic Hash,
And then generate the first common recognition request for carrying environment cryptographic Hash.First common recognition node is after receiving the request of the first common recognition, root
Can determine whether destination node is credible according to the environment cryptographic Hash that the first common recognition request carries.Specifically, each first common recognition
It is stored with the standard environment cryptographic Hash of multiple node environmental informations for meeting the credible requirement of trust network on node, corresponds to not
Node environment information with standard environment cryptographic Hash includes having not exactly the same operating system version, agent version, net
Network protocol version, trusted computation environment information and application environment information, if first common recognition request carry environment cryptographic Hash with
One of standard environment cryptographic Hash is identical, then corresponding first common recognition node can determine whether that destination node is credible.
Broker program obtains environment corresponding with first environment information by carrying out Hash operation to first environment information
Cryptographic Hash, and then the first common recognition request for carrying environment cryptographic Hash is sent to each first common recognition node, destination node is carried out
Common recognition, the data volume of the first common recognition request, Jin Erke can be reduced by being known together by transmission environment cryptographic Hash to destination node
Pressure is transmitted to reduce the data of each first common recognition node.In addition, being total to by sending environment cryptographic Hash to destination node
Know, can be protected to avoid the case where first environment information is tampered in transmission process when directly transmitting first environment information
Demonstrate,prove the credibility for the result known together to destination node.
Optionally, on the basis of trust network construction method shown in Fig. 1, step 102 will carry first environment information
At least two first common recognition nodes that first common recognition request is sent in trust network, which specifically can be in the following way
It realizes:
The first common recognition that each node for including to trust network in the form of broadcast sends carrying first environment information is asked
It asks, at least two nodes that the request of the first common recognition is received within the preset waiting time is determined as the first common recognition node,
In, waiting time timing since at the time of the first common recognition request is sent.
The broker program on destination node is installed on after the common recognition request of generation first, to trust network in the form of broadcast
In each node send the first common recognition request, each node in trust network can receive the first of destination node transmission
Common recognition request, but the node that the request of the first common recognition is only received within the waiting time just can participate in mesh as the first common recognition node
Mark the common recognition of node.Due to having different communication distances, destination node between node each in trust network and destination node
After broadcast the first common recognition request in trust network different nodes receive the request of the first common recognition time it is different, pass through setting and wait
At least two nodes for being preferentially received the request of the first common recognition are determined as the first common recognition node and participate in being total to for destination node by the time
Know, allows different destination nodes to be corresponding with the first different common recognition nodes and know together, avoid using stationary nodes pair
When the new node that trust network is added is known together, fixed define is placed into rogue program and causes to know together the situation of result inaccuracy
Occur, so as to further promote the safety of trust network.
In addition, at least two nodes for being preferentially received the request of the first common recognition, which are determined as the first common recognition node, participates in target
The common recognition of node can shorten the time needed for the first common recognition request is sent to each first common recognition node, so as to mention
The efficiency known together to destination node is risen, the usage experience of user is promoted.
Optionally, at least two nodes that the request of the first common recognition is received in the waiting time are determined as in above-described embodiment
On the basis of first common recognition node, step 103 requests the first ring carried according to the first common recognition using each first common recognition node
Border information judges whether destination node is credible, can specifically be accomplished in that
The common recognition result that each first common recognition node knows together to destination node is obtained respectively, wherein common recognition result
It is true according to the first environment information and preset white list of the first common recognition request carrying by corresponding first common recognition node
It is fixed, determine that the common recognition result of destination node is credible if first environment information is consistent with the information that white list records, if
First environment information is not inconsistent with the information that white list records then determines that the common recognition result of destination node is insincere;
According to the common recognition got from each first common recognition node as a result, calculating the credible of destination node by following formula
Probability;
Wherein, m0The number of characterization the first common recognition node;m1It characterizes and determines that the common recognition result of destination node is believable first
The number of common recognition node;K characterizes adjustment factor, and 0 k≤1 <;It characterizes from m0M is selected in a node0-m1A first
The number of combinations of common recognition node;
According to the fiducial probability of destination node, target section is determined if fiducial probability is greater than preset probability threshold value
Point is credible, determines that destination node is insincere if fiducial probability is less than or equal to preset probability threshold value.
According to the number of common recognition result and the first common recognition node that each first common recognition node knows together to destination node
Amount and preset adjustment factor calculate the fiducial probability of destination node according to above-mentioned formula, and then can be according to credible general
Rate determines whether destination node is credible, due to combining the common recognition of each first common recognition node as a result, guaranteeing calculated credible
Probability can reflect the credibility of destination node, and then guarantee the accuracy known together to destination node.
In the formula of above-mentioned calculating fiducial probability, adjustment factor k can requirement according to trust network to safety come
It determines, it is smaller that trust network gets over top adjustment coefficient k to security requirement.When lesser adjustment factor k is arranged, so that most
The common recognition node of flow control one is thought just to determine that destination node is credible, promotes the permit standard of trust network when destination node is credible.With
Family can according to trust network to safety and common recognition speed requirement, neatly to adjust coefficient k be configured, so as to
The individual demand for meeting different user promotes the user satisfaction of user.
During specific business realizing, adjustment factor k can be with value 1/3,2/3 or 1.
Optionally, on the basis of above-mentioned each embodiment provided trust network construction method, trust network building
Method can continue to know together to each node that trust network has been added, will not meet the node of trust network requirement from
It removes in trust network, can specifically be accomplished in that
After each node for including for trust network presets corresponding trigger value, include for trust network
Each node is performed both by following operation:
S1: random number is persistently calculated by Bayesian formula;
S2: calculated random number trigger value corresponding with the node will be compared each time, judge it is calculated with
Whether corresponding with the node machine number trigger value be identical, if so, executing S3, otherwise executes S1;
S3: the second environment information of the node is obtained by the broker program installed on the node, and will be acquired in carrying
At least two second common recognition nodes that second common recognition request of second environment information is sent in trust network, utilize each second
Common recognition node judges whether the node is credible according to the second environment information that the second common recognition request carries, if so, S1 is executed, it is no
Then execute S4;
S4: the node is removed from trust network.
For each node for having been added to trust network, random number is persistently calculated by Bayesian formula, works as calculating
When the trigger value corresponding with the node of random number out is identical, the of the node is obtained using the broker program installed on the node
Two environmental informations, and request the second environment information that will acquire to be sent to multiple second in trust network by the second common recognition
Common recognition node carries out common recognition processing, is to continue to calculate random number if the node is credible if common recognition result, if common recognition result is
The node is insincere, which is removed from trust network.
Specifically, the implementation that the second common recognition request is sent to each second common recognition node can refer in the present embodiment
First common recognition request is sent to the implementation of each first common recognition node in previous embodiment, is utilized in the present embodiment each
Second common recognition node judges that the whether believable implementation of node can refer in previous embodiment according to second environment information and utilizes
Each first common recognition node judges the whether believable implementation of destination node according to first environment information, second in the present embodiment
Content included by environmental information can refer to content included by first environment information in previous embodiment, no longer go to live in the household of one's in-laws on getting married herein
It states.
Firstly, for each node of trust network is had been added to, when calculate with its corresponding to trigger value it is identical
When random number, whether the environment for judging the node by being known together to the node still meets the requirement of trust network, when true
The environment of the fixed node removes the node when being unsatisfactory for the requirement of trust network from trust network.In this way, by trust
Each node carries out the common recognition of not timing in network, in time removes node incredible in trust network, can be further
Promote the safety of trust network.
Secondly, random number is persistently calculated by Bayesian formula, when calculated random number trigger value corresponding with node
It is once known together when identical to the node, so that the time known together to trust network interior joint and number are fixed
Rule avoids the environment of the node in trust network from only meeting the requirement of trust network when being known together, and routine use mistake
In journey and generation the case where being unsatisfactory for trust network requirement, so as to be further ensured that the credibility of trust network.
It should be noted that in order to further enhance the credibility of constructed trust network, involved in network struction process
To first environment information and it is each first common recognition node common recognition result can be written into block chain, meanwhile, second environment information
It also can be written into block chain with the common recognition result of each second common recognition node.
Below with reference to specific example, trust network construction method provided in an embodiment of the present invention is made further specifically
It is bright, as shown in Fig. 2, this method may comprise steps of:
Step 201: the installation agent program on the destination node that trust network is added in application.
In embodiments of the present invention, it when trust network is added in a destination node application, needs on the destination node
Installation agent program.
Step 202: the first environment information of destination node is obtained by broker program.
In embodiments of the present invention, on the target node after installation agent program, broker program can acquire destination node
Operating system version, network protocol version, trusted computation environment information, the version of application environment information and broker program itself
This information and current time, broker program is using collected every terms of information as the first environment information of destination node.
Step 203: the first common recognition request for carrying first environment information is generated by broker program.
In embodiments of the present invention, broker program, can be by pre- after collecting the first environment information of destination node
It is the operating system version of the destination node that the hash algorithm first set includes to first environment information, network protocol version, credible
The version information for calculating environmental information, application environment information and broker program itself carries out Hash operation, obtains corresponding
Environment cryptographic Hash, the first common recognition request for carrying environment cryptographic Hash and current time can be generated in broker program later.
Step 204: at least two first common recognitions that the first common recognition request is sent in trust network by broker program
Node.
In embodiments of the present invention, the broker program on destination node is installed on after the common recognition request of generation first, it can be with
Using the communication resource of destination node with each node that the form broadcasted includes to trust network send its generated first
Common recognition request.Each node that trust network includes can receive the first common recognition request of destination node transmission, wherein pre-
If at least two nodes for receiving the request of the first common recognition in the waiting time can be used as the first common recognition node and participate in destination node
Common recognition.
For example, presetting the waiting time is 3 seconds, 10000 nodes for including in trust network, on destination node
10000 nodes that broker program includes to trust network in the form broadcasted send the first common recognition request, from broker program
It sends in 3 seconds after the first common recognition is requested, the first common recognition request that node 1 to the node 50 in trust network receives,
Then node 1 to node 50 can be used as the common recognition process that the first common recognition node participates in destination node.
Step 205: being utilized respectively each first common recognition node according to the first common recognition request and judge that destination node whether may be used
Letter.
In embodiments of the present invention, for each the first common recognition node for receiving the request of the first common recognition, this is first total
Know node and obtain environment cryptographic Hash from the first received common recognition request, determines that the corresponding node environment of environment cryptographic Hash is
It is no to be located in preset white list, if so, determining that destination node is credible, otherwise determine that destination node is insincere.It needs
Illustrate, the white list being set on difference the first common recognition node can be different.
Step 206: it is whether credible that destination node being determined according to the judging result of each first common recognition node, if so, holding
Row step 208, it is no to then follow the steps 207.
In embodiments of the present invention, after each first common recognition node judges whether destination node is credible, by such as
Lower formula calculates the fiducial probability of destination node, determines if calculated fiducial probability is greater than preset probability threshold value
Destination node is credible, correspondingly executes step 208, if calculated fiducial probability is less than or equal to preset probability threshold
Value then determines that destination node is insincere, correspondingly executes step 207.
Formula for calculating destination node fiducial probability is as follows:
Wherein, m0The number of characterization the first common recognition node;m1It characterizes and determines that the common recognition result of destination node is believable first
The number of common recognition node;K characterizes adjustment factor, and 0 k≤1 <;It characterizes from m0M is selected in a node0-m1A first
The number of combinations of common recognition node.
For example, there are 45 first common recognition nodes to judge that destination node is credible in 50 first common recognition nodes, remaining 5 first
Common recognition node judges that destination node is insincere, then by m0=50, m1=45, k=1/3 substitute into above-mentioned formula and calculate destination node
Fiducial probability, due to calculated fiducial probability be greater than preset probability threshold value 0.001, so that it is determined that destination node can
Letter.
Step 207: the application of trust network is added in refusal destination node, and terminates current process.
In embodiments of the present invention, after determining that destination node is insincere according to the common recognition result of each first common recognition node,
Refuse the request that trust network is added in destination node.
Step 208: destination node is added in trust network.
It in embodiments of the present invention, will after determining that destination node is credible according to the common recognition result of each first common recognition node
Destination node is added in trust network.
Step 209: daily common recognition being carried out to the node for having been added to trust network, by incredible node from trust network
Middle removal.
In embodiments of the present invention, corresponding for the node sets in each node for including for trust network
Trigger value, and start with Bayesian formula and persistently calculate random number, when the trigger value phase of calculated random number and the node
Meanwhile the second environment information of the node is obtained by the broker program on the node, pass through preset hash algorithm pair
After second environment information carries out the corresponding environment cryptographic Hash of Hash operation acquisition, generates and carry ring corresponding to second environment information
Each node that second common recognition request of border cryptographic Hash is broadcast in trust network, it is total using receiving second within the waiting time
Whether at least two second common recognition nodes for knowing request determine the node according to the corresponding environment cryptographic Hash of second environment information
It is credible, Bayesian formula is continued with if credible and calculates random number, if insincere by the node from trust network
It removes.
As shown in Figure 3, Figure 4, the embodiment of the invention provides a kind of trust network construction devices.Installation practice can lead to
Software realization is crossed, can also be realized by way of hardware or software and hardware combining.For hardware view, as shown in figure 3, being
A kind of hardware structure diagram of equipment where trust network construction device provided in an embodiment of the present invention, in addition to processing shown in Fig. 3
Except device, memory, network interface and nonvolatile memory, the equipment in embodiment where device usually can also include
Other hardware, such as it is responsible for the forwarding chip of processing message.Taking software implementation as an example, as shown in figure 4, anticipating as a logic
Device in justice is to be read computer program instructions corresponding in nonvolatile memory by the CPU of equipment where it
Operation is formed in memory.Trust network construction device provided in this embodiment, comprising: act on behalf of installation unit 401, request is sent
Unit 402, node common recognition unit 403 and network struction unit 404;
Installation unit 401 is acted on behalf of, for the installation agent program on the destination node that trust network is added in application;
Request transmitting unit 402 obtains the of destination node for the broker program by acting on behalf of the installation of installation unit 401
One environmental information, and at least two first that the first common recognition request for carrying first environment information is sent in trust network are total to
Know node;
Node common recognition unit 403, for being requested at least using the first common recognition for receiving the transmission of request transmitting unit 402
Two first common recognition nodes judge whether destination node is credible according to the first environment information that the first common recognition request carries;
Network struction unit 404, for the judging result according to node common recognition unit 403, if destination node is credible
Destination node is added in trust network, refuses destination node application if destination node is insincere and trust network is added.
Optionally, on the basis of trust network construction device shown in Fig. 4,
The the first common recognition request for carrying first environment information is sent to trust network executing by request transmitting unit 402
In at least two first common recognition node when, be specifically used for:
Hash operation is carried out to first environment information by broker program, obtains corresponding environment cryptographic Hash, and will take
At least two first common recognition nodes that the first common recognition request with environment cryptographic Hash is sent in trust network.
Optionally, on the basis of trust network construction device shown in Fig. 4,
Request transmitting unit 402, each node for including to trust network in the form of broadcast, which is sent, carries first
First common recognition request of environmental information, and at least two nodes for the request of the first common recognition being received within the preset waiting time
It is determined as the first common recognition node, wherein waiting time timing since at the time of request is known together in transmission first.
Optionally, in above-described embodiment request transmitting unit 402 with the forms of broadcasting to each node included by trust network
On the basis of sending the first common recognition request,
Node common recognition unit 403, is specifically used for executing following steps:
Each first common recognition node is obtained respectively to the common recognition result of destination node, wherein common recognition result is by corresponding
First common recognition node according to first common recognition request carry first environment information and preset white list and determine, if
First environment information be consistent with the information that white list records then determine destination node common recognition result be it is credible, if first environment
Information is not inconsistent with the information that white list records then determines that the common recognition result of destination node is insincere;
According to each common recognition got as a result, calculating the fiducial probability of destination node by following formula;
Wherein, m0The number of characterization the first common recognition node;m1It characterizes and determines that the common recognition result of destination node is believable first
The number of common recognition node;K characterizes adjustment factor, and 0 k≤1 <;It characterizes from m0M is selected in a node0-m1A first
The number of combinations of common recognition node;
If fiducial probability is greater than preset probability threshold value, determine that destination node is credible, otherwise determines destination node
It is insincere.
Optionally, on the basis of trust network construction device shown in Fig. 4, as shown in figure 5, the trust network construction device
Further comprise: common recognition control unit 505;
Know together control unit 505, each node for including for trust network, preset one it is corresponding
Trigger value, and random number is persistently calculated by Bayesian formula, when calculated random number trigger value corresponding equal to node
Triggering command is sent to request transmitting unit 402;
Request transmitting unit 402, is further used for after receiving triggering command, passes through the broker program installed on node
The second environment information of node is obtained, and the second common recognition request for carrying second environment information is issued in trust network at least
Two second common recognition nodes;
Node common recognition unit 403 is further used for utilizing the second common recognition request for receiving the transmission of request transmitting unit 402
At least two second common recognition nodes, according to second common recognition request carry second environment information judge whether node credible;
Network struction unit 404 is further used for the judging result according to node common recognition unit 403, if it is judged that
It is insincere for node, then node is removed from trust network.
The contents such as the information exchange between each unit, implementation procedure in above-mentioned apparatus, due to implementing with the method for the present invention
Example is based on same design, and for details, please refer to the description in the embodiment of the method for the present invention, and details are not described herein again.
The embodiment of the invention also provides a kind of readable mediums, including execute instruction, when the processor of storage control is held
When executing instruction described in row, the storage control executes the trust network construction method that above-mentioned each embodiment provides.
The embodiment of the invention also provides a kind of storage controls, comprising: processor, memory and bus;
The memory is executed instruction for storing, and the processor is connect with the memory by the bus, when
When the storage control is run, the processor executes the described of memory storage and executes instruction, so that the storage
Controller executes the trust network construction method that above-mentioned each embodiment provides.
In conclusion trust network construction method and device that each embodiment of the present invention provides, at least have has as follows
Beneficial effect:
1, in embodiments of the present invention, when trust network is added in destination node application, installation agent on the target node
Program is obtained the first environment information of destination node by broker program, and the first common recognition for carrying first environment information is asked
At least two first be sent in trust network common recognition node is sought, and then can use each first common recognition node according to first
Common recognition requests the first environment information carried to judge whether destination node is credible, if it is judged that credible then for destination node
Destination node is added in trust network, if it is judged that it is insincere for destination node, refuse destination node and trust is added
The application of network.It can be seen that judge that the whether believable process of destination node is realized by multiple common recognition nodes in trust network,
Determine that destination node whether may be used jointly based on node credibility with higher of knowing together in trust network, and by multiple common recognition nodes
Letter can be controlled by Virus to avoid due to manual examination and verification fault or single audit node and insincere node is added to letter
The situation in network is appointed to occur, so as to promote the credibility of constructed trust network.
2, in embodiments of the present invention, broker program obtain the operating system version of destination node, network protocol version, can
Letter calculates the first ring of environmental information, application environment information and current time and broker program itself version as destination node
Border information, and then the first common recognition node can be directed to operating system, the network protocol, trusted computation environment, application of destination node
The many aspects such as environment are known together, and guarantee that common recognition result can more accurately reflect the ambient condition of destination node, in turn
It can guarantee the credibility that the node of trust network is added.
3, in embodiments of the present invention, broker program is obtained and the first ring by carrying out Hash operation to first environment information
The corresponding environment cryptographic Hash of border information, and then the first common recognition request for carrying environment cryptographic Hash is sent to each first common recognition
Node knows together to destination node, and being known together by transmission environment cryptographic Hash to destination node, which can reduce by the first common recognition, asks
The data volume asked, and then the data transmission pressure of each first common recognition node can be reduced.
4, it in embodiments of the present invention, is known together by sending environment cryptographic Hash to destination node, it can be to avoid direct
The case where first environment information is tampered in transmission process when sending first environment information guarantees to carry out destination node
The credibility of the result of common recognition.
5, in embodiments of the present invention, due to having different communication between node each in trust network and destination node
Distance, different nodes receive the time of the first common recognition request not in trust network after destination node broadcast the first common recognition request
Together, at least two nodes for being preferentially received the request of the first common recognition are determined as by the first common recognition node ginseng by the setting waiting time
With the common recognition of destination node, allows different destination nodes to be corresponding with the first different common recognition nodes and know together, avoid
When being known together using stationary nodes to the new node that trust network is added, fixed define is placed into rogue program common recognition is caused to be tied
The situation of fruit inaccuracy occurs, so as to further promote the safety of trust network.
6, at least two nodes for being preferentially received the request of the first common recognition in embodiments of the present invention, are determined as first to be total to
Know node participate in destination node common recognition, can shorten by first common recognition request be sent to it is each first common recognition node needed for when
Between, so as to promote the efficiency known together to destination node, promote the usage experience of user.
7, in embodiments of the present invention, according to each first common recognition result for knowing together to destination node of common recognition node with
And first common recognition node quantity and preset adjustment factor, according to formula calculate destination node fiducial probability, in turn
Can determine whether destination node is credible according to fiducial probability, due to combining the common recognition of each first common recognition node as a result, protecting
Demonstrate,proving calculated fiducial probability can reflect the credibility of destination node, and then it is accurate to guarantee to know together to destination node
Property.
8, right with its institute when calculating in embodiments of the present invention, for each node for having been added to trust network
When answering the identical random number of trigger value, whether the environment for judging the node by being known together to the node still meets trust
The requirement of network removes the node when the environment for determining the node is unsatisfactory for the requirement of trust network from trust network.This
Sample is in time moved node incredible in trust network by carrying out the common recognition of not timing to each node in trust network
It removes, can further promote the safety of trust network.
9, random number persistently in embodiments of the present invention, is calculated by Bayesian formula, when calculated random number and section
The corresponding trigger value of point once knows together to the node when identical so that the time known together to trust network interior joint with
The rule that number is not fixed avoids the environment of the node in trust network from only meeting wanting for trust network when being known together
It asks, and during routine use and generation the case where be unsatisfactory for trust network requirement, so as to be further ensured that trust network
Credibility.
It should be noted that, in this document, such as first and second etc relational terms are used merely to an entity
Or operation is distinguished with another entity or operation, is existed without necessarily requiring or implying between these entities or operation
Any actual relationship or order.Moreover, the terms "include", "comprise" or its any other variant be intended to it is non-
It is exclusive to include, so that the process, method, article or equipment for including a series of elements not only includes those elements,
It but also including other elements that are not explicitly listed, or further include solid by this process, method, article or equipment
Some elements.In the absence of more restrictions, the element limited by sentence " including one ", is not arranged
Except there is also other identical factors in the process, method, article or apparatus that includes the element.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above method embodiment can pass through
The relevant hardware of program instruction is completed, and program above-mentioned can store in computer-readable storage medium, the program
When being executed, step including the steps of the foregoing method embodiments is executed;And storage medium above-mentioned includes: ROM, RAM, magnetic disk or light
In the various media that can store program code such as disk.
Finally, it should be noted that the foregoing is merely presently preferred embodiments of the present invention, it is merely to illustrate skill of the invention
Art scheme, is not intended to limit the scope of the present invention.Any modification for being made all within the spirits and principles of the present invention,
Equivalent replacement, improvement etc., are included within the scope of protection of the present invention.
Claims (10)
1. a kind of trust network construction method characterized by comprising
The installation agent program on the destination node that the trust network is added in application;
The first environment information of the destination node is obtained by the broker program, and will carry the first environment information
At least two first common recognition nodes that first common recognition request is sent in the trust network;
Using at least two first common recognitions node, sentenced according to the first environment information that the first common recognition request carries
Whether the destination node that breaks is credible;
If so, in the trust network that the destination node is added to;
If not, refusing the application that the trust network is added in the destination node.
2. the method according to claim 1, wherein
The first environment information includes: the operating system version of the destination node, the version of the broker program, the mesh
Mark the network protocol version of node, the trusted computation environment information of the destination node, the application environment of destination node letter
It is any one or more in breath and current time;
Wherein, the current time is to obtain the time of the environmental information, and the current time passes through Coordinated Universal Time(UTC) UTC
Calibration;
And/or
Institute will be carried after the first environment information for obtaining the destination node by the broker program, and described
State first environment information first common recognition request be sent in the trust network at least two first common recognition nodes before, into
One step includes:
Hash operation is carried out to the first environment information by the broker program, obtains corresponding environment cryptographic Hash;
And at least two that the first common recognition request for carrying the first environment information is sent in the trust network
First common recognition node, comprising:
At least two first common recognitions that the first common recognition request for carrying the environment cryptographic Hash is sent in the trust network
Node.
3. the method according to claim 1, wherein first common recognition that the first environment information will be carried
Request be sent in the trust network at least two first common recognition nodes, comprising:
The each node transmission for including to the trust network in the form of broadcast carries the first of the first environment information and is total to
Know request;
At least two nodes that the first common recognition request will be received within the preset waiting time are determined as described the
One common recognition node, wherein waiting time timing since at the time of sending the first common recognition request.
4. according to the method described in claim 3, it is characterized in that, described utilize at least two first common recognitions node, root
Judge whether the destination node is credible according to the first environment information that the first common recognition request carries, comprising:
Each described first common recognition node is obtained respectively to the common recognition result of the destination node, wherein the common recognition result
The first environment information carried is requested according to first common recognition by the corresponding first common recognition node and is set in advance
Fixed white list and determine, determine the target if the first environment information is consistent with the information that the white list records
The common recognition result of node be it is credible, if the first environment information and the white list record information be not inconsistent if determine described in
The common recognition result of destination node is insincere;
According to each common recognition got as a result, calculating the fiducial probability of the destination node by following formula;
Wherein, the m0Characterize the number of the first common recognition node;The m1Characterization determines the common recognition result of the destination node
For the number of the believable first common recognition node;The k characterizes adjustment factor, and 0 k≤1 <;It is describedCharacterization from
m0M is selected in a node0-m1The number of combinations of a first common recognition node;
If the fiducial probability be greater than preset probability threshold value, determine that the destination node is credible, otherwise determine described in
Destination node is insincere.
5. according to claim 1 to any method in 4, which is characterized in that further comprise:
For each node that the trust network includes, a corresponding trigger value is preset;
For node described in each, random number is persistently calculated by Bayesian formula, when the calculated random number is equal to
When the corresponding trigger value of the node, the second of the node is obtained by the broker program installed on the node
Environmental information, and the second common recognition request for carrying the second environment information issued in the trust network at least two the
Two common recognition nodes, the second environment carried using at least two second common recognition node according to the second common recognition request
Information judges whether the node is credible, if it is judged that it is insincere for the node, then by the node from the trust
It is removed in network.
6. a kind of trust network construction device characterized by comprising act on behalf of installation unit, request transmitting unit, node common recognition
Unit and network struction unit;
It is described to act on behalf of installation unit, for the installation agent program on the destination node that the trust network is added in application;
The request transmitting unit, for obtaining the target section by the broker program for acting on behalf of installation unit installation
The first environment information of point, and the first common recognition request for carrying the first environment information is sent in the trust network
At least two first common recognition nodes;
The node common recognition unit, for utilizing the institute for receiving the first common recognition request that the request transmitting unit is sent
At least two first common recognition nodes are stated, the target is judged according to the first environment information that the first common recognition request carries
Whether node is credible;
The network struction unit, for the judging result according to node common recognition unit, if the destination node is credible
Then the destination node is added in the trust network, refuses the destination node if the destination node is insincere
The trust network is added in application.
7. device according to claim 6, which is characterized in that
The request transmitting unit is sent to described in the execution first common recognition request that will carry the first environment information
In trust network at least two first common recognition node when, be specifically used for:
Hash operation is carried out to the first environment information by the broker program, obtains corresponding environment cryptographic Hash, and
At least two described first that the first common recognition request for carrying the environment cryptographic Hash is sent in the trust network
Common recognition node.
8. device according to claim 6, which is characterized in that
The request transmitting unit, each node for including to the trust network in the form of broadcast are sent described in carrying
The first common recognition request of first environment information, and the first common recognition request will be received within the preset waiting time
At least two nodes are determined as the first common recognition node, wherein the waiting time asks from first common recognition is sent
Start timing at the time of asking.
9. device according to claim 8, which is characterized in that
The node common recognition unit, is specifically used for executing following steps:
Each described first common recognition node is obtained respectively to the common recognition result of the destination node, wherein the common recognition result
The first environment information carried is requested according to first common recognition by the corresponding first common recognition node and is set in advance
Fixed white list and determine, determine the target if the first environment information is consistent with the information that the white list records
The common recognition result of node be it is credible, if the first environment information and the white list record information be not inconsistent if determine described in
The common recognition result of destination node is insincere;
According to each common recognition got as a result, calculating the fiducial probability of the destination node by following formula;
Wherein, the m0Characterize the number of the first common recognition node;The m1Characterization determines the common recognition result of the destination node
For the number of the believable first common recognition node;The k characterizes adjustment factor, and 0 k≤1 <;It is describedCharacterization from
m0M is selected in a node0-m1The number of combinations of a first common recognition node;
If the fiducial probability be greater than preset probability threshold value, determine that the destination node is credible, otherwise determine described in
Destination node is insincere.
10. according to the device any in claim 6 to 9, which is characterized in that further comprise: common recognition control unit;
The common recognition control unit, each described node for including for the trust network, presets a phase
Corresponding trigger value, and random number is persistently calculated by Bayesian formula, when the calculated random number is equal to the node
Triggering command is sent to the request transmitting unit when the corresponding trigger value;
The request transmitting unit is further used for after receiving the triggering command, passes through the institute installed on the node
State the second environment information that broker program obtains the node, and the second common recognition request hair that the second environment information will be carried
To at least two second common recognition nodes in the trust network;
The node common recognition unit is further used for asking using second common recognition for receiving the request transmitting unit transmission
At least two second common recognitions node asked judges institute according to the second environment information that the second common recognition request carries
Whether credible state node;
The network struction unit is further used for the judging result according to node common recognition unit, if it is judged that being
The node is insincere, then removes the node from the trust network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811010526.2A CN108989468B (en) | 2018-08-31 | 2018-08-31 | Trust network construction method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811010526.2A CN108989468B (en) | 2018-08-31 | 2018-08-31 | Trust network construction method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108989468A true CN108989468A (en) | 2018-12-11 |
CN108989468B CN108989468B (en) | 2021-03-30 |
Family
ID=64547910
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811010526.2A Active CN108989468B (en) | 2018-08-31 | 2018-08-31 | Trust network construction method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108989468B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109831307A (en) * | 2018-12-28 | 2019-05-31 | 上海分布信息科技有限公司 | Computerized information authentication method and authentification of message system |
CN111460458A (en) * | 2020-03-31 | 2020-07-28 | 腾讯科技(深圳)有限公司 | Data processing method, related device and computer storage medium |
CN112804305A (en) * | 2020-12-30 | 2021-05-14 | 北京八分量信息科技有限公司 | Credible networking method and system of internet node and related products |
CN112822267A (en) * | 2021-01-05 | 2021-05-18 | 支付宝(杭州)信息技术有限公司 | Data processing method and device based on block chain |
CN113032489A (en) * | 2021-03-29 | 2021-06-25 | 湖北央中巨石信息技术有限公司 | Asynchronous consensus method, system, device and medium based on block chain |
CN116489641A (en) * | 2023-05-05 | 2023-07-25 | 烟台欣飞智能系统有限公司 | 5G mobile device communication management and control system based on block chain |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106375317A (en) * | 2016-08-31 | 2017-02-01 | 北京明朝万达科技股份有限公司 | Block chain-based big data security authentication method and system |
CN107241360A (en) * | 2017-08-04 | 2017-10-10 | 北京明朝万达科技股份有限公司 | A kind of data safety shares exchange method and data safety shares switching plane system |
CN107342858A (en) * | 2017-07-05 | 2017-11-10 | 武汉凤链科技有限公司 | A kind of intelligent contract guard method and system based on trusted context |
CN107438003A (en) * | 2016-05-27 | 2017-12-05 | 索尼公司 | Electronic equipment, method and information processing system for electronic equipment |
CN107784546A (en) * | 2016-08-31 | 2018-03-09 | 北京明朝万达科技股份有限公司 | A kind of data trade method and system based on block chain |
WO2019127278A1 (en) * | 2017-12-28 | 2019-07-04 | 深圳达闼科技控股有限公司 | Safe access blockchain method, apparatus, system, storage medium, and electronic device |
EP3526721A1 (en) * | 2016-10-14 | 2019-08-21 | Nokia Technologies Oy | Method, device and system for validating sensitive user data transactions within trusted circle |
-
2018
- 2018-08-31 CN CN201811010526.2A patent/CN108989468B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107438003A (en) * | 2016-05-27 | 2017-12-05 | 索尼公司 | Electronic equipment, method and information processing system for electronic equipment |
CN106375317A (en) * | 2016-08-31 | 2017-02-01 | 北京明朝万达科技股份有限公司 | Block chain-based big data security authentication method and system |
CN107784546A (en) * | 2016-08-31 | 2018-03-09 | 北京明朝万达科技股份有限公司 | A kind of data trade method and system based on block chain |
EP3526721A1 (en) * | 2016-10-14 | 2019-08-21 | Nokia Technologies Oy | Method, device and system for validating sensitive user data transactions within trusted circle |
CN107342858A (en) * | 2017-07-05 | 2017-11-10 | 武汉凤链科技有限公司 | A kind of intelligent contract guard method and system based on trusted context |
CN107241360A (en) * | 2017-08-04 | 2017-10-10 | 北京明朝万达科技股份有限公司 | A kind of data safety shares exchange method and data safety shares switching plane system |
WO2019127278A1 (en) * | 2017-12-28 | 2019-07-04 | 深圳达闼科技控股有限公司 | Safe access blockchain method, apparatus, system, storage medium, and electronic device |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109831307A (en) * | 2018-12-28 | 2019-05-31 | 上海分布信息科技有限公司 | Computerized information authentication method and authentification of message system |
CN109831307B (en) * | 2018-12-28 | 2021-07-20 | 上海分布信息科技有限公司 | Computer information authentication method and information authentication system |
CN111460458A (en) * | 2020-03-31 | 2020-07-28 | 腾讯科技(深圳)有限公司 | Data processing method, related device and computer storage medium |
CN111460458B (en) * | 2020-03-31 | 2022-05-27 | 腾讯科技(深圳)有限公司 | Data processing method, related device and computer storage medium |
CN112804305A (en) * | 2020-12-30 | 2021-05-14 | 北京八分量信息科技有限公司 | Credible networking method and system of internet node and related products |
CN112804305B (en) * | 2020-12-30 | 2023-03-31 | 北京八分量信息科技有限公司 | Credible networking method and system of internet node and related product |
CN112822267A (en) * | 2021-01-05 | 2021-05-18 | 支付宝(杭州)信息技术有限公司 | Data processing method and device based on block chain |
CN112822267B (en) * | 2021-01-05 | 2022-08-26 | 支付宝(杭州)信息技术有限公司 | Data processing method and device based on block chain |
CN113032489A (en) * | 2021-03-29 | 2021-06-25 | 湖北央中巨石信息技术有限公司 | Asynchronous consensus method, system, device and medium based on block chain |
CN116489641A (en) * | 2023-05-05 | 2023-07-25 | 烟台欣飞智能系统有限公司 | 5G mobile device communication management and control system based on block chain |
Also Published As
Publication number | Publication date |
---|---|
CN108989468B (en) | 2021-03-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108989468A (en) | A kind of trust network construction method and device | |
KR102288344B1 (en) | Service execution method and device | |
WO2020253111A1 (en) | Automatic expansion method and apparatus for blockchain node, and operation and maintenance terminal and storage medium | |
EP2902914B1 (en) | Data transmission method and device | |
CN109918924A (en) | The control method and system of dynamic access permission | |
CN108494771A (en) | Electronic device, fire wall open verification method and storage medium | |
CN104702592B (en) | Stream media downloading method and device | |
CN110224943B (en) | Flow service current limiting method based on URL, electronic equipment and computer storage medium | |
WO2020133963A1 (en) | Blockchain-based data storage method, related device and storage medium | |
WO2015117309A1 (en) | Method and apparatus for generating warning | |
CN110247857B (en) | Current limiting method and device | |
CN112486915A (en) | Data storage method and device | |
CN106993028A (en) | Network time acquisition methods, apparatus and system, computer-readable recording medium and storage control | |
CN111814146B (en) | Incidence relation establishing method and device for object, server and storage medium | |
CN112988896A (en) | Synchronous consensus method, system, device and medium based on block chain | |
CN112732560B (en) | Method and device for detecting leakage risk of file descriptor | |
CN107707395B (en) | Data transmission method, device and system | |
US12079201B2 (en) | Blockchain-based data storage method, related device and storage medium | |
WO2021073413A1 (en) | Method and apparatus for sending system performance parameters, management device, and storage medium | |
CN115051824B (en) | Vertical override detection method, system, equipment and storage medium | |
CN113132742B (en) | Queue-based double-buffer AI video transmission method and related equipment | |
CN112817742B (en) | Data migration method, device, equipment and storage medium | |
US20180063005A1 (en) | Non-blocking request processing method and device | |
CN110769010B (en) | Data management authority processing method and device and computer equipment | |
CN113079063A (en) | Offline judgment method, system and device for charging device and computer storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |