CN108989468A - A kind of trust network construction method and device - Google Patents

A kind of trust network construction method and device Download PDF

Info

Publication number
CN108989468A
CN108989468A CN201811010526.2A CN201811010526A CN108989468A CN 108989468 A CN108989468 A CN 108989468A CN 201811010526 A CN201811010526 A CN 201811010526A CN 108989468 A CN108989468 A CN 108989468A
Authority
CN
China
Prior art keywords
node
common recognition
trust network
destination node
environment information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811010526.2A
Other languages
Chinese (zh)
Other versions
CN108989468B (en
Inventor
阮安邦
魏明
陈凯
王佳帅
任立峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Eight Component Mdt Infotech Ltd Of Beijing
Beijing Octa Innovations Information Technology Co Ltd
Original Assignee
Eight Component Mdt Infotech Ltd Of Beijing
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Eight Component Mdt Infotech Ltd Of Beijing filed Critical Eight Component Mdt Infotech Ltd Of Beijing
Priority to CN201811010526.2A priority Critical patent/CN108989468B/en
Publication of CN108989468A publication Critical patent/CN108989468A/en
Application granted granted Critical
Publication of CN108989468B publication Critical patent/CN108989468B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1044Group management mechanisms 
    • H04L67/1046Joining mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0281Proxies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention provides a kind of trust network construction method and devices, this method comprises: the installation agent program on the destination node that the trust network is added in application;The first environment information of the destination node, and at least two first common recognition nodes that the first common recognition request for carrying the first environment information is sent in the trust network are obtained by the broker program;Using at least two first common recognitions node, judge whether the destination node is credible according to the first environment information that the first common recognition request carries;If so, in the trust network that the destination node is added to;If not, refusing the application that the trust network is added in the destination node.The device includes: to act on behalf of installation unit, request transmitting unit, node common recognition unit and network struction unit.This programme is able to ascend the credibility of constructed trust network.

Description

A kind of trust network construction method and device
Technical field
The present invention relates to field of computer technology, in particular to a kind of trust network construction method and device.
Background technique
Block chain is substantially the database of a decentralization, can not be tampered based on institute's storing data on block chain Characteristic, block chain are with a wide range of applications in fields such as finance, insurance, medical treatment.Block chain is being applied to specific business It when scene, needs to construct trust network, each trusted node for including by trust network is total to the information of write-in block chain Know, to determine whether the information in write-in block chain is credible.
Currently, for the node for needing to be added trust network, obtaining the environmental information of the node when constructing trust network It is audited, if the environmental information of the node meets the requirement of trust network, which is added in trust network.
For the method for current building trust network, trust usually is added to application by manually or specifically auditing node The environmental information of the node of network is audited, if manual examination and verification process is made a fault or is audited node and controlled by Virus, The node that environmental information may be then unsatisfactory for trust network requirement is added in trust network, leads to the credible journey of trust network Degree reduces.Therefore, the credibility by trust network constructed by existing trust network construction method is lower.
Summary of the invention
The embodiment of the invention provides a kind of trust network construction method and device, it is able to ascend constructed trust network Credibility.
In a first aspect, the embodiment of the invention provides a kind of trust network construction methods, comprising:
The installation agent program on the destination node that the trust network is added in application;
The first environment information of the destination node is obtained by the broker program, and will carry the first environment letter At least two first common recognition nodes that first common recognition request of breath is sent in the trust network;
Using at least two first common recognitions node, believed according to the first environment that the first common recognition request carries Breath judges whether the destination node is credible;
If so, in the trust network that the destination node is added to;
If not, refusing the application that the trust network is added in the destination node.
Optionally,
The first environment information includes: the operating system version of the destination node, the version of the broker program, institute State the application ring of the network protocol version of destination node, the trusted computation environment information of the destination node, the destination node It is any one or more in border information and current time;
Wherein, the current time is to obtain the time of the environmental information, and the current time is by coordinating the world When UTC calibrate.
Optionally,
It will be taken after the first environment information for obtaining the destination node by the broker program, and described With the first environment information first common recognition request be sent in the trust network at least two first common recognition nodes it Before, further comprise:
Hash operation is carried out to the first environment information by the broker program, obtains corresponding environment Hash Value;
And it is described will carry the first environment information first common recognition request be sent in the trust network at least Two first common recognition nodes, comprising:
At least two first that the first common recognition request for carrying the environment cryptographic Hash is sent in the trust network Common recognition node.
Optionally,
At least two that the first common recognition request for carrying the first environment information is sent in the trust network A first common recognition node, comprising:
Each node for including to the trust network in the form of broadcast, which is sent, carries the of the first environment information One common recognition request;
At least two nodes that the first common recognition request is received within the preset waiting time are determined as institute State the first common recognition node, wherein waiting time timing since at the time of sending the first common recognition request.
Optionally,
First ring that is described to utilize at least two first common recognitions node, being carried according to the first common recognition request Border information judges whether the destination node is credible, comprising:
Each described first common recognition node is obtained respectively to the common recognition result of the destination node, wherein the common recognition As a result the first environment information that is carried by the corresponding first common recognition node according to the first common recognition request and pre- The white list that first sets and determine, determined if the first environment information is consistent with the information that the white list records described in The common recognition result of destination node be it is credible, determined if the information that the first environment information is recorded with the white list is not inconsistent The common recognition result of the destination node is insincere;
According to each common recognition got as a result, calculating the fiducial probability of the destination node by following formula;
Wherein, the m0Characterize the number of the first common recognition node;The m1Characterization determines the common recognition of the destination node It as a result is the number of the believable first common recognition node;The k characterizes adjustment factor, and 0 k≤1 <;It is describedTable It levies from m0M is selected in a node0-m1The number of combinations of a first common recognition node;
If the fiducial probability is greater than preset probability threshold value, determines that the destination node is credible, otherwise determine The destination node is insincere.
Optionally,
The trust network construction method further comprises:
For each node that the trust network includes, a corresponding trigger value is preset;
For node described in each, random number is persistently calculated by Bayesian formula, when the calculated random number When the trigger value corresponding equal to the node, the node is obtained by the broker program installed on the node Second environment information, and request the second common recognition for carrying the second environment information to issue at least two in the trust network A second common recognition node, described second carried using at least two second common recognition node according to the second common recognition request Environmental information judges whether the node is credible, if it is judged that it is insincere for the node, then by the node from described It is removed in trust network.
Second aspect, the embodiment of the invention also provides a kind of trust network construction devices, comprising: act on behalf of installation unit, Request transmitting unit, node common recognition unit and network struction unit;
It is described to act on behalf of installation unit, for the installation agent program on the destination node that the trust network is added in application;
The request transmitting unit, for obtaining the mesh by the broker program for acting on behalf of installation unit installation The first environment information of node is marked, and the first common recognition request for carrying the first environment information is sent to the trust network In at least two first common recognition nodes;
The node common recognition unit, the first common recognition request for being sent using the request transmitting unit is received It is described at least two first common recognition node, according to it is described first common recognition request carry the first environment information judgement described in Whether destination node is credible;
The network struction unit, for the judging result according to node common recognition unit, if the destination node It is credible, the destination node is added in the trust network, refuses the target if the destination node is insincere The trust network is added in node application.
Optionally,
The request transmitting unit is sent in the execution first common recognition request that will carry the first environment information In the trust network at least two first common recognition node when, be specifically used for:
Hash operation is carried out to the first environment information by the broker program, obtains corresponding environment Hash Value, and first common recognition for carrying the environment cryptographic Hash is requested described in be sent in the trust network at least two First common recognition node.
Optionally,
The request transmitting unit, each node for including to the trust network in the form of broadcast, which is sent, to be carried The first common recognition request of the first environment information, and first common recognition will be received within the preset waiting time and asked At least two asked the node is determined as the first common recognition node, wherein the waiting time is total from sending described first Start timing at the time of knowing request.
Optionally,
The node common recognition unit, is specifically used for executing following steps:
Each described first common recognition node is obtained respectively to the common recognition result of the destination node, wherein the common recognition As a result the first environment information that is carried by the corresponding first common recognition node according to the first common recognition request and pre- The white list that first sets and determine, determined if the first environment information is consistent with the information that the white list records described in The common recognition result of destination node be it is credible, determined if the information that the first environment information is recorded with the white list is not inconsistent The common recognition result of the destination node is insincere;
According to each common recognition got as a result, calculating the fiducial probability of the destination node by following formula;
Wherein, the m0Characterize the number of the first common recognition node;The m1Characterization determines the common recognition of the destination node It as a result is the number of the believable first common recognition node;The k characterizes adjustment factor, and 0 k≤1 <;It is describedTable It levies from m0M is selected in a node0-m1The number of combinations of a first common recognition node;
If the fiducial probability is greater than preset probability threshold value, determines that the destination node is credible, otherwise determine The destination node is insincere.
Optionally,
The trust network construction device further comprises: common recognition control unit;
The common recognition control unit, each described node for including for the trust network, presets one A corresponding trigger value, and random number is persistently calculated by Bayesian formula, when the calculated random number is equal to described Triggering command is sent to the request transmitting unit when the corresponding trigger value of node;
The request transmitting unit is further used for after receiving the triggering command, by installing on the node The broker program obtain the second environment information of the node, and the second common recognition that will carry the second environment information is asked Seek at least two second common recognition nodes issued in the trust network;
The node common recognition unit is further used for total using receive the request transmitting unit transmission described second At least two second common recognitions node for knowing request, sentences according to the second environment information that the second common recognition request carries Whether the node that breaks is credible;
The network struction unit is further used for the judging result according to node common recognition unit, if it is determined that knot Fruit is that the node is insincere, then removes the node from the trust network.
The embodiment of the invention provides trust network construction method and devices, when trust network is added in destination node application When, installation agent program on the target node obtains the first environment information of destination node by broker program, and will carry the At least two first common recognition nodes that first common recognition request of one environmental information is sent in trust network, and then can use each Whether a first common recognition node is credible to judge destination node according to the first environment information of the first common recognition request carrying, if sentenced Disconnected result is that destination node is credible, and destination node is added in trust network, if it is judged that insincere for destination node Then refuse the application that trust network is added in destination node.It can be seen that judging the whether believable process of destination node by trust Multiple common recognition nodes in network are realized, are saved based on node credibility with higher of knowing together in trust network, and by multiple common recognitions Point is common to determine whether destination node is credible, can be to avoid since manual examination and verification fault or single audit node are by Virus control It makes and insincere node is added to the situation in trust network and is occurred, so as to promote the credible journey of constructed trust network Degree.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is the present invention Some embodiments for those of ordinary skill in the art without creative efforts, can also basis These attached drawings obtain other attached drawings.
Fig. 1 is a kind of flow chart of trust network construction method provided by one embodiment of the present invention;
Fig. 2 is the flow chart of another trust network construction method provided by one embodiment of the present invention;
Fig. 3 is the schematic diagram of equipment where a kind of trust network construction device provided by one embodiment of the present invention;
Fig. 4 is a kind of schematic diagram of trust network construction device provided by one embodiment of the present invention;
Fig. 5 is the schematic diagram of another trust network construction device provided by one embodiment of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments, based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
As shown in Figure 1, this method may include following step the embodiment of the invention provides a kind of trust network construction method It is rapid:
Step 101: the installation agent program on the destination node that trust network is added in application;
Step 102: obtaining the first environment information of destination node by broker program, and first environment information will be carried At least two first common recognition nodes that first common recognition request is sent in trust network;
Step 103: using at least two first common recognition nodes, being sentenced according to the first environment information that the first common recognition request carries Whether disconnected destination node is credible, if so, step 104 is executed, it is no to then follow the steps 105;
Step 104: in the trust network that destination node is added to, and terminating current process;
Step 105: the application of trust network is added in refusal destination node.
The embodiment of the invention provides a kind of trust network construction methods, when trust network is added in destination node application, Installation agent program on the target node, the first environment information of destination node is obtained by broker program, and will carry first At least two first common recognition nodes that first common recognition request of environmental information is sent in trust network, and then can use each First common recognition node judges whether destination node is credible according to the first environment information that the first common recognition request carries, if it is determined that As a result credible for destination node, destination node is added in trust network, if it is judged that insincere then for destination node Refuse the application that trust network is added in destination node.It can be seen that judging the whether believable process of destination node by trust network In multiple common recognition nodes realize, based on node credibility with higher of knowing together in trust network, and by multiple common recognition nodes It is common to determine whether destination node is credible, it can be controlled to avoid due to manual examination and verification fault or single audit node by Virus And insincere node is added to the situation in trust network and is occurred, so as to promote the credible journey of constructed trust network Degree.
Optionally, on the basis of trust network construction method shown in Fig. 1, believed by the first environment that broker program is got Breath includes the operating system version of destination node, the version of broker program, the network protocol version of destination node, destination node Some or all of in trusted computation environment information, the application environment information of destination node and current time, wherein when current Between refer to broker program obtain first environment information included by other each information time, and the current time by coordinate generation (Coordinated Universal Time, UTC) is calibrated when boundary.
Broker program obtains the operating system version, network protocol version, trusted computation environment information, application of destination node The first environment information of environmental information and current time and broker program itself version as destination node, and then the first common recognition Node can be total to for many aspects such as operating system, network protocol, trusted computation environment, the application environments of destination node Know, guarantees that common recognition result can more accurately reflect the ambient condition of destination node, and then can guarantee that trust network is added Node credibility.
Wherein, using current time as a part of first environment information, it is ensured that included by first environment information Other information reflection be destination node current ambient conditions, be further ensured that it is each first common recognition node to destination node into The accuracy of row common recognition.In addition, using the version of broker program as a part of first environment information, it can be from the source of information On ensure the safety of first environment information, be further ensured that the accuracy known together to destination node.
It should be noted that broker program independent operating on destination node, acquire the process of first environment information not by The control of destination node, thereby may be ensured that broker program collected first environment information and destination node actual environment It is consistent, and then guarantees whether each first common recognition node according to first environment information can accurately determine destination node credible, Guarantee the safety of trust network.
Optionally, on the basis of trust network construction method shown in Fig. 1, step 102 obtains target by broker program After the first environment information of node, Hash operation can be carried out to the first environment information got by broker program, obtained Obtain environment cryptographic Hash corresponding with first environment information.Correspondingly, the first common recognition request is sent to trust network by step 102 In at least two first common recognition node when, can will carry environment cryptographic Hash first common recognition request issue in trust network At least two first common recognition nodes.
Broker program needs after the first environment information of the destination node got according to the first environment letter got Breath generates the first common recognition request, specifically can carry out Hash operation to first environment information and obtain corresponding environment cryptographic Hash, And then generate the first common recognition request for carrying environment cryptographic Hash.First common recognition node is after receiving the request of the first common recognition, root Can determine whether destination node is credible according to the environment cryptographic Hash that the first common recognition request carries.Specifically, each first common recognition It is stored with the standard environment cryptographic Hash of multiple node environmental informations for meeting the credible requirement of trust network on node, corresponds to not Node environment information with standard environment cryptographic Hash includes having not exactly the same operating system version, agent version, net Network protocol version, trusted computation environment information and application environment information, if first common recognition request carry environment cryptographic Hash with One of standard environment cryptographic Hash is identical, then corresponding first common recognition node can determine whether that destination node is credible.
Broker program obtains environment corresponding with first environment information by carrying out Hash operation to first environment information Cryptographic Hash, and then the first common recognition request for carrying environment cryptographic Hash is sent to each first common recognition node, destination node is carried out Common recognition, the data volume of the first common recognition request, Jin Erke can be reduced by being known together by transmission environment cryptographic Hash to destination node Pressure is transmitted to reduce the data of each first common recognition node.In addition, being total to by sending environment cryptographic Hash to destination node Know, can be protected to avoid the case where first environment information is tampered in transmission process when directly transmitting first environment information Demonstrate,prove the credibility for the result known together to destination node.
Optionally, on the basis of trust network construction method shown in Fig. 1, step 102 will carry first environment information At least two first common recognition nodes that first common recognition request is sent in trust network, which specifically can be in the following way It realizes:
The first common recognition that each node for including to trust network in the form of broadcast sends carrying first environment information is asked It asks, at least two nodes that the request of the first common recognition is received within the preset waiting time is determined as the first common recognition node, In, waiting time timing since at the time of the first common recognition request is sent.
The broker program on destination node is installed on after the common recognition request of generation first, to trust network in the form of broadcast In each node send the first common recognition request, each node in trust network can receive the first of destination node transmission Common recognition request, but the node that the request of the first common recognition is only received within the waiting time just can participate in mesh as the first common recognition node Mark the common recognition of node.Due to having different communication distances, destination node between node each in trust network and destination node After broadcast the first common recognition request in trust network different nodes receive the request of the first common recognition time it is different, pass through setting and wait At least two nodes for being preferentially received the request of the first common recognition are determined as the first common recognition node and participate in being total to for destination node by the time Know, allows different destination nodes to be corresponding with the first different common recognition nodes and know together, avoid using stationary nodes pair When the new node that trust network is added is known together, fixed define is placed into rogue program and causes to know together the situation of result inaccuracy Occur, so as to further promote the safety of trust network.
In addition, at least two nodes for being preferentially received the request of the first common recognition, which are determined as the first common recognition node, participates in target The common recognition of node can shorten the time needed for the first common recognition request is sent to each first common recognition node, so as to mention The efficiency known together to destination node is risen, the usage experience of user is promoted.
Optionally, at least two nodes that the request of the first common recognition is received in the waiting time are determined as in above-described embodiment On the basis of first common recognition node, step 103 requests the first ring carried according to the first common recognition using each first common recognition node Border information judges whether destination node is credible, can specifically be accomplished in that
The common recognition result that each first common recognition node knows together to destination node is obtained respectively, wherein common recognition result It is true according to the first environment information and preset white list of the first common recognition request carrying by corresponding first common recognition node It is fixed, determine that the common recognition result of destination node is credible if first environment information is consistent with the information that white list records, if First environment information is not inconsistent with the information that white list records then determines that the common recognition result of destination node is insincere;
According to the common recognition got from each first common recognition node as a result, calculating the credible of destination node by following formula Probability;
Wherein, m0The number of characterization the first common recognition node;m1It characterizes and determines that the common recognition result of destination node is believable first The number of common recognition node;K characterizes adjustment factor, and 0 k≤1 <;It characterizes from m0M is selected in a node0-m1A first The number of combinations of common recognition node;
According to the fiducial probability of destination node, target section is determined if fiducial probability is greater than preset probability threshold value Point is credible, determines that destination node is insincere if fiducial probability is less than or equal to preset probability threshold value.
According to the number of common recognition result and the first common recognition node that each first common recognition node knows together to destination node Amount and preset adjustment factor calculate the fiducial probability of destination node according to above-mentioned formula, and then can be according to credible general Rate determines whether destination node is credible, due to combining the common recognition of each first common recognition node as a result, guaranteeing calculated credible Probability can reflect the credibility of destination node, and then guarantee the accuracy known together to destination node.
In the formula of above-mentioned calculating fiducial probability, adjustment factor k can requirement according to trust network to safety come It determines, it is smaller that trust network gets over top adjustment coefficient k to security requirement.When lesser adjustment factor k is arranged, so that most The common recognition node of flow control one is thought just to determine that destination node is credible, promotes the permit standard of trust network when destination node is credible.With Family can according to trust network to safety and common recognition speed requirement, neatly to adjust coefficient k be configured, so as to The individual demand for meeting different user promotes the user satisfaction of user.
During specific business realizing, adjustment factor k can be with value 1/3,2/3 or 1.
Optionally, on the basis of above-mentioned each embodiment provided trust network construction method, trust network building Method can continue to know together to each node that trust network has been added, will not meet the node of trust network requirement from It removes in trust network, can specifically be accomplished in that
After each node for including for trust network presets corresponding trigger value, include for trust network Each node is performed both by following operation:
S1: random number is persistently calculated by Bayesian formula;
S2: calculated random number trigger value corresponding with the node will be compared each time, judge it is calculated with Whether corresponding with the node machine number trigger value be identical, if so, executing S3, otherwise executes S1;
S3: the second environment information of the node is obtained by the broker program installed on the node, and will be acquired in carrying At least two second common recognition nodes that second common recognition request of second environment information is sent in trust network, utilize each second Common recognition node judges whether the node is credible according to the second environment information that the second common recognition request carries, if so, S1 is executed, it is no Then execute S4;
S4: the node is removed from trust network.
For each node for having been added to trust network, random number is persistently calculated by Bayesian formula, works as calculating When the trigger value corresponding with the node of random number out is identical, the of the node is obtained using the broker program installed on the node Two environmental informations, and request the second environment information that will acquire to be sent to multiple second in trust network by the second common recognition Common recognition node carries out common recognition processing, is to continue to calculate random number if the node is credible if common recognition result, if common recognition result is The node is insincere, which is removed from trust network.
Specifically, the implementation that the second common recognition request is sent to each second common recognition node can refer in the present embodiment First common recognition request is sent to the implementation of each first common recognition node in previous embodiment, is utilized in the present embodiment each Second common recognition node judges that the whether believable implementation of node can refer in previous embodiment according to second environment information and utilizes Each first common recognition node judges the whether believable implementation of destination node according to first environment information, second in the present embodiment Content included by environmental information can refer to content included by first environment information in previous embodiment, no longer go to live in the household of one's in-laws on getting married herein It states.
Firstly, for each node of trust network is had been added to, when calculate with its corresponding to trigger value it is identical When random number, whether the environment for judging the node by being known together to the node still meets the requirement of trust network, when true The environment of the fixed node removes the node when being unsatisfactory for the requirement of trust network from trust network.In this way, by trust Each node carries out the common recognition of not timing in network, in time removes node incredible in trust network, can be further Promote the safety of trust network.
Secondly, random number is persistently calculated by Bayesian formula, when calculated random number trigger value corresponding with node It is once known together when identical to the node, so that the time known together to trust network interior joint and number are fixed Rule avoids the environment of the node in trust network from only meeting the requirement of trust network when being known together, and routine use mistake In journey and generation the case where being unsatisfactory for trust network requirement, so as to be further ensured that the credibility of trust network.
It should be noted that in order to further enhance the credibility of constructed trust network, involved in network struction process To first environment information and it is each first common recognition node common recognition result can be written into block chain, meanwhile, second environment information It also can be written into block chain with the common recognition result of each second common recognition node.
Below with reference to specific example, trust network construction method provided in an embodiment of the present invention is made further specifically It is bright, as shown in Fig. 2, this method may comprise steps of:
Step 201: the installation agent program on the destination node that trust network is added in application.
In embodiments of the present invention, it when trust network is added in a destination node application, needs on the destination node Installation agent program.
Step 202: the first environment information of destination node is obtained by broker program.
In embodiments of the present invention, on the target node after installation agent program, broker program can acquire destination node Operating system version, network protocol version, trusted computation environment information, the version of application environment information and broker program itself This information and current time, broker program is using collected every terms of information as the first environment information of destination node.
Step 203: the first common recognition request for carrying first environment information is generated by broker program.
In embodiments of the present invention, broker program, can be by pre- after collecting the first environment information of destination node It is the operating system version of the destination node that the hash algorithm first set includes to first environment information, network protocol version, credible The version information for calculating environmental information, application environment information and broker program itself carries out Hash operation, obtains corresponding Environment cryptographic Hash, the first common recognition request for carrying environment cryptographic Hash and current time can be generated in broker program later.
Step 204: at least two first common recognitions that the first common recognition request is sent in trust network by broker program Node.
In embodiments of the present invention, the broker program on destination node is installed on after the common recognition request of generation first, it can be with Using the communication resource of destination node with each node that the form broadcasted includes to trust network send its generated first Common recognition request.Each node that trust network includes can receive the first common recognition request of destination node transmission, wherein pre- If at least two nodes for receiving the request of the first common recognition in the waiting time can be used as the first common recognition node and participate in destination node Common recognition.
For example, presetting the waiting time is 3 seconds, 10000 nodes for including in trust network, on destination node 10000 nodes that broker program includes to trust network in the form broadcasted send the first common recognition request, from broker program It sends in 3 seconds after the first common recognition is requested, the first common recognition request that node 1 to the node 50 in trust network receives, Then node 1 to node 50 can be used as the common recognition process that the first common recognition node participates in destination node.
Step 205: being utilized respectively each first common recognition node according to the first common recognition request and judge that destination node whether may be used Letter.
In embodiments of the present invention, for each the first common recognition node for receiving the request of the first common recognition, this is first total Know node and obtain environment cryptographic Hash from the first received common recognition request, determines that the corresponding node environment of environment cryptographic Hash is It is no to be located in preset white list, if so, determining that destination node is credible, otherwise determine that destination node is insincere.It needs Illustrate, the white list being set on difference the first common recognition node can be different.
Step 206: it is whether credible that destination node being determined according to the judging result of each first common recognition node, if so, holding Row step 208, it is no to then follow the steps 207.
In embodiments of the present invention, after each first common recognition node judges whether destination node is credible, by such as Lower formula calculates the fiducial probability of destination node, determines if calculated fiducial probability is greater than preset probability threshold value Destination node is credible, correspondingly executes step 208, if calculated fiducial probability is less than or equal to preset probability threshold Value then determines that destination node is insincere, correspondingly executes step 207.
Formula for calculating destination node fiducial probability is as follows:
Wherein, m0The number of characterization the first common recognition node;m1It characterizes and determines that the common recognition result of destination node is believable first The number of common recognition node;K characterizes adjustment factor, and 0 k≤1 <;It characterizes from m0M is selected in a node0-m1A first The number of combinations of common recognition node.
For example, there are 45 first common recognition nodes to judge that destination node is credible in 50 first common recognition nodes, remaining 5 first Common recognition node judges that destination node is insincere, then by m0=50, m1=45, k=1/3 substitute into above-mentioned formula and calculate destination node Fiducial probability, due to calculated fiducial probability be greater than preset probability threshold value 0.001, so that it is determined that destination node can Letter.
Step 207: the application of trust network is added in refusal destination node, and terminates current process.
In embodiments of the present invention, after determining that destination node is insincere according to the common recognition result of each first common recognition node, Refuse the request that trust network is added in destination node.
Step 208: destination node is added in trust network.
It in embodiments of the present invention, will after determining that destination node is credible according to the common recognition result of each first common recognition node Destination node is added in trust network.
Step 209: daily common recognition being carried out to the node for having been added to trust network, by incredible node from trust network Middle removal.
In embodiments of the present invention, corresponding for the node sets in each node for including for trust network Trigger value, and start with Bayesian formula and persistently calculate random number, when the trigger value phase of calculated random number and the node Meanwhile the second environment information of the node is obtained by the broker program on the node, pass through preset hash algorithm pair After second environment information carries out the corresponding environment cryptographic Hash of Hash operation acquisition, generates and carry ring corresponding to second environment information Each node that second common recognition request of border cryptographic Hash is broadcast in trust network, it is total using receiving second within the waiting time Whether at least two second common recognition nodes for knowing request determine the node according to the corresponding environment cryptographic Hash of second environment information It is credible, Bayesian formula is continued with if credible and calculates random number, if insincere by the node from trust network It removes.
As shown in Figure 3, Figure 4, the embodiment of the invention provides a kind of trust network construction devices.Installation practice can lead to Software realization is crossed, can also be realized by way of hardware or software and hardware combining.For hardware view, as shown in figure 3, being A kind of hardware structure diagram of equipment where trust network construction device provided in an embodiment of the present invention, in addition to processing shown in Fig. 3 Except device, memory, network interface and nonvolatile memory, the equipment in embodiment where device usually can also include Other hardware, such as it is responsible for the forwarding chip of processing message.Taking software implementation as an example, as shown in figure 4, anticipating as a logic Device in justice is to be read computer program instructions corresponding in nonvolatile memory by the CPU of equipment where it Operation is formed in memory.Trust network construction device provided in this embodiment, comprising: act on behalf of installation unit 401, request is sent Unit 402, node common recognition unit 403 and network struction unit 404;
Installation unit 401 is acted on behalf of, for the installation agent program on the destination node that trust network is added in application;
Request transmitting unit 402 obtains the of destination node for the broker program by acting on behalf of the installation of installation unit 401 One environmental information, and at least two first that the first common recognition request for carrying first environment information is sent in trust network are total to Know node;
Node common recognition unit 403, for being requested at least using the first common recognition for receiving the transmission of request transmitting unit 402 Two first common recognition nodes judge whether destination node is credible according to the first environment information that the first common recognition request carries;
Network struction unit 404, for the judging result according to node common recognition unit 403, if destination node is credible Destination node is added in trust network, refuses destination node application if destination node is insincere and trust network is added.
Optionally, on the basis of trust network construction device shown in Fig. 4,
The the first common recognition request for carrying first environment information is sent to trust network executing by request transmitting unit 402 In at least two first common recognition node when, be specifically used for:
Hash operation is carried out to first environment information by broker program, obtains corresponding environment cryptographic Hash, and will take At least two first common recognition nodes that the first common recognition request with environment cryptographic Hash is sent in trust network.
Optionally, on the basis of trust network construction device shown in Fig. 4,
Request transmitting unit 402, each node for including to trust network in the form of broadcast, which is sent, carries first First common recognition request of environmental information, and at least two nodes for the request of the first common recognition being received within the preset waiting time It is determined as the first common recognition node, wherein waiting time timing since at the time of request is known together in transmission first.
Optionally, in above-described embodiment request transmitting unit 402 with the forms of broadcasting to each node included by trust network On the basis of sending the first common recognition request,
Node common recognition unit 403, is specifically used for executing following steps:
Each first common recognition node is obtained respectively to the common recognition result of destination node, wherein common recognition result is by corresponding First common recognition node according to first common recognition request carry first environment information and preset white list and determine, if First environment information be consistent with the information that white list records then determine destination node common recognition result be it is credible, if first environment Information is not inconsistent with the information that white list records then determines that the common recognition result of destination node is insincere;
According to each common recognition got as a result, calculating the fiducial probability of destination node by following formula;
Wherein, m0The number of characterization the first common recognition node;m1It characterizes and determines that the common recognition result of destination node is believable first The number of common recognition node;K characterizes adjustment factor, and 0 k≤1 <;It characterizes from m0M is selected in a node0-m1A first The number of combinations of common recognition node;
If fiducial probability is greater than preset probability threshold value, determine that destination node is credible, otherwise determines destination node It is insincere.
Optionally, on the basis of trust network construction device shown in Fig. 4, as shown in figure 5, the trust network construction device Further comprise: common recognition control unit 505;
Know together control unit 505, each node for including for trust network, preset one it is corresponding Trigger value, and random number is persistently calculated by Bayesian formula, when calculated random number trigger value corresponding equal to node Triggering command is sent to request transmitting unit 402;
Request transmitting unit 402, is further used for after receiving triggering command, passes through the broker program installed on node The second environment information of node is obtained, and the second common recognition request for carrying second environment information is issued in trust network at least Two second common recognition nodes;
Node common recognition unit 403 is further used for utilizing the second common recognition request for receiving the transmission of request transmitting unit 402 At least two second common recognition nodes, according to second common recognition request carry second environment information judge whether node credible;
Network struction unit 404 is further used for the judging result according to node common recognition unit 403, if it is judged that It is insincere for node, then node is removed from trust network.
The contents such as the information exchange between each unit, implementation procedure in above-mentioned apparatus, due to implementing with the method for the present invention Example is based on same design, and for details, please refer to the description in the embodiment of the method for the present invention, and details are not described herein again.
The embodiment of the invention also provides a kind of readable mediums, including execute instruction, when the processor of storage control is held When executing instruction described in row, the storage control executes the trust network construction method that above-mentioned each embodiment provides.
The embodiment of the invention also provides a kind of storage controls, comprising: processor, memory and bus;
The memory is executed instruction for storing, and the processor is connect with the memory by the bus, when When the storage control is run, the processor executes the described of memory storage and executes instruction, so that the storage Controller executes the trust network construction method that above-mentioned each embodiment provides.
In conclusion trust network construction method and device that each embodiment of the present invention provides, at least have has as follows Beneficial effect:
1, in embodiments of the present invention, when trust network is added in destination node application, installation agent on the target node Program is obtained the first environment information of destination node by broker program, and the first common recognition for carrying first environment information is asked At least two first be sent in trust network common recognition node is sought, and then can use each first common recognition node according to first Common recognition requests the first environment information carried to judge whether destination node is credible, if it is judged that credible then for destination node Destination node is added in trust network, if it is judged that it is insincere for destination node, refuse destination node and trust is added The application of network.It can be seen that judge that the whether believable process of destination node is realized by multiple common recognition nodes in trust network, Determine that destination node whether may be used jointly based on node credibility with higher of knowing together in trust network, and by multiple common recognition nodes Letter can be controlled by Virus to avoid due to manual examination and verification fault or single audit node and insincere node is added to letter The situation in network is appointed to occur, so as to promote the credibility of constructed trust network.
2, in embodiments of the present invention, broker program obtain the operating system version of destination node, network protocol version, can Letter calculates the first ring of environmental information, application environment information and current time and broker program itself version as destination node Border information, and then the first common recognition node can be directed to operating system, the network protocol, trusted computation environment, application of destination node The many aspects such as environment are known together, and guarantee that common recognition result can more accurately reflect the ambient condition of destination node, in turn It can guarantee the credibility that the node of trust network is added.
3, in embodiments of the present invention, broker program is obtained and the first ring by carrying out Hash operation to first environment information The corresponding environment cryptographic Hash of border information, and then the first common recognition request for carrying environment cryptographic Hash is sent to each first common recognition Node knows together to destination node, and being known together by transmission environment cryptographic Hash to destination node, which can reduce by the first common recognition, asks The data volume asked, and then the data transmission pressure of each first common recognition node can be reduced.
4, it in embodiments of the present invention, is known together by sending environment cryptographic Hash to destination node, it can be to avoid direct The case where first environment information is tampered in transmission process when sending first environment information guarantees to carry out destination node The credibility of the result of common recognition.
5, in embodiments of the present invention, due to having different communication between node each in trust network and destination node Distance, different nodes receive the time of the first common recognition request not in trust network after destination node broadcast the first common recognition request Together, at least two nodes for being preferentially received the request of the first common recognition are determined as by the first common recognition node ginseng by the setting waiting time With the common recognition of destination node, allows different destination nodes to be corresponding with the first different common recognition nodes and know together, avoid When being known together using stationary nodes to the new node that trust network is added, fixed define is placed into rogue program common recognition is caused to be tied The situation of fruit inaccuracy occurs, so as to further promote the safety of trust network.
6, at least two nodes for being preferentially received the request of the first common recognition in embodiments of the present invention, are determined as first to be total to Know node participate in destination node common recognition, can shorten by first common recognition request be sent to it is each first common recognition node needed for when Between, so as to promote the efficiency known together to destination node, promote the usage experience of user.
7, in embodiments of the present invention, according to each first common recognition result for knowing together to destination node of common recognition node with And first common recognition node quantity and preset adjustment factor, according to formula calculate destination node fiducial probability, in turn Can determine whether destination node is credible according to fiducial probability, due to combining the common recognition of each first common recognition node as a result, protecting Demonstrate,proving calculated fiducial probability can reflect the credibility of destination node, and then it is accurate to guarantee to know together to destination node Property.
8, right with its institute when calculating in embodiments of the present invention, for each node for having been added to trust network When answering the identical random number of trigger value, whether the environment for judging the node by being known together to the node still meets trust The requirement of network removes the node when the environment for determining the node is unsatisfactory for the requirement of trust network from trust network.This Sample is in time moved node incredible in trust network by carrying out the common recognition of not timing to each node in trust network It removes, can further promote the safety of trust network.
9, random number persistently in embodiments of the present invention, is calculated by Bayesian formula, when calculated random number and section The corresponding trigger value of point once knows together to the node when identical so that the time known together to trust network interior joint with The rule that number is not fixed avoids the environment of the node in trust network from only meeting wanting for trust network when being known together It asks, and during routine use and generation the case where be unsatisfactory for trust network requirement, so as to be further ensured that trust network Credibility.
It should be noted that, in this document, such as first and second etc relational terms are used merely to an entity Or operation is distinguished with another entity or operation, is existed without necessarily requiring or implying between these entities or operation Any actual relationship or order.Moreover, the terms "include", "comprise" or its any other variant be intended to it is non- It is exclusive to include, so that the process, method, article or equipment for including a series of elements not only includes those elements, It but also including other elements that are not explicitly listed, or further include solid by this process, method, article or equipment Some elements.In the absence of more restrictions, the element limited by sentence " including one ", is not arranged Except there is also other identical factors in the process, method, article or apparatus that includes the element.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above method embodiment can pass through The relevant hardware of program instruction is completed, and program above-mentioned can store in computer-readable storage medium, the program When being executed, step including the steps of the foregoing method embodiments is executed;And storage medium above-mentioned includes: ROM, RAM, magnetic disk or light In the various media that can store program code such as disk.
Finally, it should be noted that the foregoing is merely presently preferred embodiments of the present invention, it is merely to illustrate skill of the invention Art scheme, is not intended to limit the scope of the present invention.Any modification for being made all within the spirits and principles of the present invention, Equivalent replacement, improvement etc., are included within the scope of protection of the present invention.

Claims (10)

1. a kind of trust network construction method characterized by comprising
The installation agent program on the destination node that the trust network is added in application;
The first environment information of the destination node is obtained by the broker program, and will carry the first environment information At least two first common recognition nodes that first common recognition request is sent in the trust network;
Using at least two first common recognitions node, sentenced according to the first environment information that the first common recognition request carries Whether the destination node that breaks is credible;
If so, in the trust network that the destination node is added to;
If not, refusing the application that the trust network is added in the destination node.
2. the method according to claim 1, wherein
The first environment information includes: the operating system version of the destination node, the version of the broker program, the mesh Mark the network protocol version of node, the trusted computation environment information of the destination node, the application environment of destination node letter It is any one or more in breath and current time;
Wherein, the current time is to obtain the time of the environmental information, and the current time passes through Coordinated Universal Time(UTC) UTC Calibration;
And/or
Institute will be carried after the first environment information for obtaining the destination node by the broker program, and described State first environment information first common recognition request be sent in the trust network at least two first common recognition nodes before, into One step includes:
Hash operation is carried out to the first environment information by the broker program, obtains corresponding environment cryptographic Hash;
And at least two that the first common recognition request for carrying the first environment information is sent in the trust network First common recognition node, comprising:
At least two first common recognitions that the first common recognition request for carrying the environment cryptographic Hash is sent in the trust network Node.
3. the method according to claim 1, wherein first common recognition that the first environment information will be carried Request be sent in the trust network at least two first common recognition nodes, comprising:
The each node transmission for including to the trust network in the form of broadcast carries the first of the first environment information and is total to Know request;
At least two nodes that the first common recognition request will be received within the preset waiting time are determined as described the One common recognition node, wherein waiting time timing since at the time of sending the first common recognition request.
4. according to the method described in claim 3, it is characterized in that, described utilize at least two first common recognitions node, root Judge whether the destination node is credible according to the first environment information that the first common recognition request carries, comprising:
Each described first common recognition node is obtained respectively to the common recognition result of the destination node, wherein the common recognition result The first environment information carried is requested according to first common recognition by the corresponding first common recognition node and is set in advance Fixed white list and determine, determine the target if the first environment information is consistent with the information that the white list records The common recognition result of node be it is credible, if the first environment information and the white list record information be not inconsistent if determine described in The common recognition result of destination node is insincere;
According to each common recognition got as a result, calculating the fiducial probability of the destination node by following formula;
Wherein, the m0Characterize the number of the first common recognition node;The m1Characterization determines the common recognition result of the destination node For the number of the believable first common recognition node;The k characterizes adjustment factor, and 0 k≤1 <;It is describedCharacterization from m0M is selected in a node0-m1The number of combinations of a first common recognition node;
If the fiducial probability be greater than preset probability threshold value, determine that the destination node is credible, otherwise determine described in Destination node is insincere.
5. according to claim 1 to any method in 4, which is characterized in that further comprise:
For each node that the trust network includes, a corresponding trigger value is preset;
For node described in each, random number is persistently calculated by Bayesian formula, when the calculated random number is equal to When the corresponding trigger value of the node, the second of the node is obtained by the broker program installed on the node Environmental information, and the second common recognition request for carrying the second environment information issued in the trust network at least two the Two common recognition nodes, the second environment carried using at least two second common recognition node according to the second common recognition request Information judges whether the node is credible, if it is judged that it is insincere for the node, then by the node from the trust It is removed in network.
6. a kind of trust network construction device characterized by comprising act on behalf of installation unit, request transmitting unit, node common recognition Unit and network struction unit;
It is described to act on behalf of installation unit, for the installation agent program on the destination node that the trust network is added in application;
The request transmitting unit, for obtaining the target section by the broker program for acting on behalf of installation unit installation The first environment information of point, and the first common recognition request for carrying the first environment information is sent in the trust network At least two first common recognition nodes;
The node common recognition unit, for utilizing the institute for receiving the first common recognition request that the request transmitting unit is sent At least two first common recognition nodes are stated, the target is judged according to the first environment information that the first common recognition request carries Whether node is credible;
The network struction unit, for the judging result according to node common recognition unit, if the destination node is credible Then the destination node is added in the trust network, refuses the destination node if the destination node is insincere The trust network is added in application.
7. device according to claim 6, which is characterized in that
The request transmitting unit is sent to described in the execution first common recognition request that will carry the first environment information In trust network at least two first common recognition node when, be specifically used for:
Hash operation is carried out to the first environment information by the broker program, obtains corresponding environment cryptographic Hash, and At least two described first that the first common recognition request for carrying the environment cryptographic Hash is sent in the trust network Common recognition node.
8. device according to claim 6, which is characterized in that
The request transmitting unit, each node for including to the trust network in the form of broadcast are sent described in carrying The first common recognition request of first environment information, and the first common recognition request will be received within the preset waiting time At least two nodes are determined as the first common recognition node, wherein the waiting time asks from first common recognition is sent Start timing at the time of asking.
9. device according to claim 8, which is characterized in that
The node common recognition unit, is specifically used for executing following steps:
Each described first common recognition node is obtained respectively to the common recognition result of the destination node, wherein the common recognition result The first environment information carried is requested according to first common recognition by the corresponding first common recognition node and is set in advance Fixed white list and determine, determine the target if the first environment information is consistent with the information that the white list records The common recognition result of node be it is credible, if the first environment information and the white list record information be not inconsistent if determine described in The common recognition result of destination node is insincere;
According to each common recognition got as a result, calculating the fiducial probability of the destination node by following formula;
Wherein, the m0Characterize the number of the first common recognition node;The m1Characterization determines the common recognition result of the destination node For the number of the believable first common recognition node;The k characterizes adjustment factor, and 0 k≤1 <;It is describedCharacterization from m0M is selected in a node0-m1The number of combinations of a first common recognition node;
If the fiducial probability be greater than preset probability threshold value, determine that the destination node is credible, otherwise determine described in Destination node is insincere.
10. according to the device any in claim 6 to 9, which is characterized in that further comprise: common recognition control unit;
The common recognition control unit, each described node for including for the trust network, presets a phase Corresponding trigger value, and random number is persistently calculated by Bayesian formula, when the calculated random number is equal to the node Triggering command is sent to the request transmitting unit when the corresponding trigger value;
The request transmitting unit is further used for after receiving the triggering command, passes through the institute installed on the node State the second environment information that broker program obtains the node, and the second common recognition request hair that the second environment information will be carried To at least two second common recognition nodes in the trust network;
The node common recognition unit is further used for asking using second common recognition for receiving the request transmitting unit transmission At least two second common recognitions node asked judges institute according to the second environment information that the second common recognition request carries Whether credible state node;
The network struction unit is further used for the judging result according to node common recognition unit, if it is judged that being The node is insincere, then removes the node from the trust network.
CN201811010526.2A 2018-08-31 2018-08-31 Trust network construction method and device Active CN108989468B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811010526.2A CN108989468B (en) 2018-08-31 2018-08-31 Trust network construction method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811010526.2A CN108989468B (en) 2018-08-31 2018-08-31 Trust network construction method and device

Publications (2)

Publication Number Publication Date
CN108989468A true CN108989468A (en) 2018-12-11
CN108989468B CN108989468B (en) 2021-03-30

Family

ID=64547910

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811010526.2A Active CN108989468B (en) 2018-08-31 2018-08-31 Trust network construction method and device

Country Status (1)

Country Link
CN (1) CN108989468B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109831307A (en) * 2018-12-28 2019-05-31 上海分布信息科技有限公司 Computerized information authentication method and authentification of message system
CN111460458A (en) * 2020-03-31 2020-07-28 腾讯科技(深圳)有限公司 Data processing method, related device and computer storage medium
CN112804305A (en) * 2020-12-30 2021-05-14 北京八分量信息科技有限公司 Credible networking method and system of internet node and related products
CN112822267A (en) * 2021-01-05 2021-05-18 支付宝(杭州)信息技术有限公司 Data processing method and device based on block chain
CN113032489A (en) * 2021-03-29 2021-06-25 湖北央中巨石信息技术有限公司 Asynchronous consensus method, system, device and medium based on block chain
CN116489641A (en) * 2023-05-05 2023-07-25 烟台欣飞智能系统有限公司 5G mobile device communication management and control system based on block chain

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106375317A (en) * 2016-08-31 2017-02-01 北京明朝万达科技股份有限公司 Block chain-based big data security authentication method and system
CN107241360A (en) * 2017-08-04 2017-10-10 北京明朝万达科技股份有限公司 A kind of data safety shares exchange method and data safety shares switching plane system
CN107342858A (en) * 2017-07-05 2017-11-10 武汉凤链科技有限公司 A kind of intelligent contract guard method and system based on trusted context
CN107438003A (en) * 2016-05-27 2017-12-05 索尼公司 Electronic equipment, method and information processing system for electronic equipment
CN107784546A (en) * 2016-08-31 2018-03-09 北京明朝万达科技股份有限公司 A kind of data trade method and system based on block chain
WO2019127278A1 (en) * 2017-12-28 2019-07-04 深圳达闼科技控股有限公司 Safe access blockchain method, apparatus, system, storage medium, and electronic device
EP3526721A1 (en) * 2016-10-14 2019-08-21 Nokia Technologies Oy Method, device and system for validating sensitive user data transactions within trusted circle

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107438003A (en) * 2016-05-27 2017-12-05 索尼公司 Electronic equipment, method and information processing system for electronic equipment
CN106375317A (en) * 2016-08-31 2017-02-01 北京明朝万达科技股份有限公司 Block chain-based big data security authentication method and system
CN107784546A (en) * 2016-08-31 2018-03-09 北京明朝万达科技股份有限公司 A kind of data trade method and system based on block chain
EP3526721A1 (en) * 2016-10-14 2019-08-21 Nokia Technologies Oy Method, device and system for validating sensitive user data transactions within trusted circle
CN107342858A (en) * 2017-07-05 2017-11-10 武汉凤链科技有限公司 A kind of intelligent contract guard method and system based on trusted context
CN107241360A (en) * 2017-08-04 2017-10-10 北京明朝万达科技股份有限公司 A kind of data safety shares exchange method and data safety shares switching plane system
WO2019127278A1 (en) * 2017-12-28 2019-07-04 深圳达闼科技控股有限公司 Safe access blockchain method, apparatus, system, storage medium, and electronic device

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109831307A (en) * 2018-12-28 2019-05-31 上海分布信息科技有限公司 Computerized information authentication method and authentification of message system
CN109831307B (en) * 2018-12-28 2021-07-20 上海分布信息科技有限公司 Computer information authentication method and information authentication system
CN111460458A (en) * 2020-03-31 2020-07-28 腾讯科技(深圳)有限公司 Data processing method, related device and computer storage medium
CN111460458B (en) * 2020-03-31 2022-05-27 腾讯科技(深圳)有限公司 Data processing method, related device and computer storage medium
CN112804305A (en) * 2020-12-30 2021-05-14 北京八分量信息科技有限公司 Credible networking method and system of internet node and related products
CN112804305B (en) * 2020-12-30 2023-03-31 北京八分量信息科技有限公司 Credible networking method and system of internet node and related product
CN112822267A (en) * 2021-01-05 2021-05-18 支付宝(杭州)信息技术有限公司 Data processing method and device based on block chain
CN112822267B (en) * 2021-01-05 2022-08-26 支付宝(杭州)信息技术有限公司 Data processing method and device based on block chain
CN113032489A (en) * 2021-03-29 2021-06-25 湖北央中巨石信息技术有限公司 Asynchronous consensus method, system, device and medium based on block chain
CN116489641A (en) * 2023-05-05 2023-07-25 烟台欣飞智能系统有限公司 5G mobile device communication management and control system based on block chain

Also Published As

Publication number Publication date
CN108989468B (en) 2021-03-30

Similar Documents

Publication Publication Date Title
CN108989468A (en) A kind of trust network construction method and device
KR102288344B1 (en) Service execution method and device
WO2020253111A1 (en) Automatic expansion method and apparatus for blockchain node, and operation and maintenance terminal and storage medium
EP2902914B1 (en) Data transmission method and device
CN109918924A (en) The control method and system of dynamic access permission
CN108494771A (en) Electronic device, fire wall open verification method and storage medium
CN104702592B (en) Stream media downloading method and device
CN110224943B (en) Flow service current limiting method based on URL, electronic equipment and computer storage medium
WO2020133963A1 (en) Blockchain-based data storage method, related device and storage medium
WO2015117309A1 (en) Method and apparatus for generating warning
CN110247857B (en) Current limiting method and device
CN112486915A (en) Data storage method and device
CN106993028A (en) Network time acquisition methods, apparatus and system, computer-readable recording medium and storage control
CN111814146B (en) Incidence relation establishing method and device for object, server and storage medium
CN112988896A (en) Synchronous consensus method, system, device and medium based on block chain
CN112732560B (en) Method and device for detecting leakage risk of file descriptor
CN107707395B (en) Data transmission method, device and system
US12079201B2 (en) Blockchain-based data storage method, related device and storage medium
WO2021073413A1 (en) Method and apparatus for sending system performance parameters, management device, and storage medium
CN115051824B (en) Vertical override detection method, system, equipment and storage medium
CN113132742B (en) Queue-based double-buffer AI video transmission method and related equipment
CN112817742B (en) Data migration method, device, equipment and storage medium
US20180063005A1 (en) Non-blocking request processing method and device
CN110769010B (en) Data management authority processing method and device and computer equipment
CN113079063A (en) Offline judgment method, system and device for charging device and computer storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant