CN112788117A - Authentication system arranged on internet node, block chain system and related product - Google Patents

Authentication system arranged on internet node, block chain system and related product Download PDF

Info

Publication number
CN112788117A
CN112788117A CN202011615073.3A CN202011615073A CN112788117A CN 112788117 A CN112788117 A CN 112788117A CN 202011615073 A CN202011615073 A CN 202011615073A CN 112788117 A CN112788117 A CN 112788117A
Authority
CN
China
Prior art keywords
authentication
blockchain
kernel
nodes
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011615073.3A
Other languages
Chinese (zh)
Other versions
CN112788117B (en
Inventor
阮安邦
陈凯
魏明
陈旭明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Octa Innovations Information Technology Co Ltd
Original Assignee
Beijing Octa Innovations Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Octa Innovations Information Technology Co Ltd filed Critical Beijing Octa Innovations Information Technology Co Ltd
Priority to CN202011615073.3A priority Critical patent/CN112788117B/en
Publication of CN112788117A publication Critical patent/CN112788117A/en
Application granted granted Critical
Publication of CN112788117B publication Critical patent/CN112788117B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Environmental & Geological Engineering (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application discloses an authentication system arranged on an internet node, a block chain system and related products, wherein the authentication system arranged on the internet node is deployed on a block chain node in the block chain system; the authentication system provided on an internet node includes: the system comprises an authentication kernel and a kernel maintenance module; the system comprises an authentication kernel, a trust evaluation kernel matrix and a trust evaluation kernel matrix, wherein the authentication kernel is used for authenticating an authentication system at a peer end to obtain the trust evaluation kernel matrix when two block link points communicate, and storing the trust evaluation kernel matrix; the kernel maintenance module is used for updating the trust kernel matrix between the two block chain nodes. The authentication system arranged on the internet node, the block chain system and the related products can effectively simplify the authentication process of the block chain node and improve the authentication efficiency of the block chain node.

Description

Authentication system arranged on internet node, block chain system and related product
Technical Field
The present application relates to the field of blockchain technologies, and in particular, to an authentication system installed on an internet node, a blockchain system, and a related product.
Background
The blockchain system (essentially a big data system) is an integrated application mode of technologies such as a distributed data storage system, point-to-point transmission, a consensus mechanism and an encryption algorithm, and can realize trust and value transfer which cannot be realized by the traditional internet on the internet. The blockchain system comprises a plurality of blockchain nodes, and because the blockchain system is a decentralized system, if the normal and safe operation of the blockchain system is ensured, the blockchain nodes (essentially internet nodes) must be authenticated, and the blockchain nodes can participate in the operation only if the state of the blockchain nodes passes the authentication. However, in the prior art, the authentication process is complicated, which results in low authentication efficiency and greatly affects the operation of the blockchain system.
Disclosure of Invention
Based on the above problems, embodiments of the present application provide an authentication system, a blockchain system, and related products disposed on an internet node.
In a first aspect, an embodiment of the present application provides an authentication system disposed on an internet node, where the authentication system disposed on the internet node is deployed on a blockchain node in a blockchain system;
the authentication system provided on an internet node includes: the system comprises an authentication kernel and a kernel maintenance module;
the system comprises an authentication kernel, a trust evaluation kernel matrix and a trust evaluation kernel matrix, wherein the authentication kernel is used for authenticating an authentication system at a peer end to obtain the trust evaluation kernel matrix when two block link points communicate, and storing the trust evaluation kernel matrix; the kernel maintenance module is used for updating the trust kernel matrix between the two block chain nodes.
Optionally, in a specific embodiment, the core maintenance module is further configured to switch the trust core matrix to other blockchain nodes in the blockchain system, the other blockchain nodes being different from the two blockchain nodes.
Optionally, in a specific embodiment, the authentication system provided on the internet node further includes: and the network monitoring module is used for monitoring whether communication is carried out between two block chain nodes in the block chain system, and if the communication is carried out, the authentication system of the opposite end of the two block chain nodes in the authentication kernel is triggered to carry out authentication to obtain the trust evaluation kernel matrix.
Optionally, in a specific embodiment, the network monitoring module is configured to monitor network traffic generated between two blockchain nodes in the blockchain system to monitor whether communication is performed between the two blockchain nodes in the blockchain system.
Optionally, in a specific embodiment, an authentication system disposed on an internet node acts as a neuron.
Optionally, in a specific embodiment, the kernel maintenance module is further configured to enable the frequently communicated plurality of block chain nodes to form a neuron authentication network, and all neurons in the neuron authentication network share an upper layer service component.
Optionally, in a specific embodiment, the neuron authentication network has a uniform interface for providing proof of interaction services hosted between neurons in the neuron authentication network.
In a second aspect, an embodiment of the present application provides a blockchain system, including: a plurality of block chain nodes, each block chain node having deployed thereon an authentication system disposed on an internet node, comprising:
the system comprises an authentication kernel and a kernel maintenance module;
the system comprises an authentication kernel, a trust evaluation kernel matrix and a trust evaluation kernel matrix, wherein the authentication kernel is used for authenticating an authentication system at a peer end to obtain the trust evaluation kernel matrix when two block link points communicate, and storing the trust evaluation kernel matrix; the kernel maintenance module is used for updating the trust kernel matrix between the two block chain nodes.
In a third aspect, an embodiment of the present application provides an electronic device, including: a memory having computer-executable instructions stored thereon and a processor for executing the computer-executable instructions to perform the steps of:
when two block chain link points communicate, authenticating an authentication system at the opposite end to obtain a trust evaluation core matrix, and storing the trust evaluation core matrix;
and updating the trust kernel matrix between the two blockchain nodes.
In a fourth aspect, embodiments of the present application provide a computer storage medium having computer-executable instructions stored thereon, where the computer-executable instructions, when executed, implement the following steps:
when two block chain link points communicate, authenticating an authentication system at the opposite end to obtain a trust evaluation core matrix, and storing the trust evaluation core matrix;
and updating the trust kernel matrix between the two blockchain nodes.
The application discloses an authentication system arranged on an internet node, a block chain system and related products, wherein the authentication system arranged on the internet node is deployed on a block chain node in the block chain system; the authentication system provided on an internet node includes: the system comprises an authentication kernel and a kernel maintenance module; the system comprises an authentication kernel, a trust evaluation kernel matrix and a trust evaluation kernel matrix, wherein the authentication kernel is used for authenticating an authentication system at a peer end to obtain the trust evaluation kernel matrix when two block link points communicate, and storing the trust evaluation kernel matrix; the kernel maintenance module is used for updating the trust kernel matrix between the two block chain nodes. The authentication system arranged on the internet node, the block chain system and the related products can effectively simplify the authentication process of the block chain node and improve the authentication efficiency of the block chain node.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
Fig. 1 is a schematic diagram of an authentication system disposed on an internet node according to an embodiment of the present application;
fig. 2 is a schematic diagram of a blockchain system according to an embodiment of the present disclosure;
fig. 3 is a schematic diagram of an electronic device according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure;
fig. 5 is a schematic diagram of a computer storage medium according to an embodiment of the present application.
Detailed Description
It is not necessary for any particular embodiment of the invention to achieve all of the above advantages at the same time.
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
Referring to fig. 1, an authentication system 10 disposed on an internet node is provided in an embodiment of the present application, where the authentication system 10 disposed on the internet node is deployed on a blockchain node in a blockchain system;
the authentication system 10 provided on an internet node includes: an authentication kernel 101 and a kernel maintenance module 102;
the authentication kernel 101 is configured to authenticate an authentication system at an opposite end to obtain a trust evaluation kernel matrix when two block link points communicate with each other, and store the trust evaluation kernel matrix; the kernel maintenance module 102 is configured to update the trust kernel matrix between two blockchain nodes.
Optionally, in this embodiment, a plurality of internet nodes may form a big data system, for example, the big data system is a blockchain system, and the blockchain system is, for example, a federation chain, a private chain, or a public chain; optionally, in this embodiment, the internet node includes a blockchain node, and the blockchain node may be a blockchain light node and a blockchain full node. The block chain whole node is a node which possesses all transaction data of the whole network, and the block chain light node is a node which only possesses the transaction data related to the light node.
In this embodiment, it should be noted that, when a plurality of blockchain nodes form a blockchain system, the authentication system may be deployed only on a part of blockchain nodes, or the authentication system may be deployed on all blockchain nodes. For example, for a private chain, since the number of blockchain nodes is relatively small, the authentication system may be deployed on all blockchain nodes in order to ensure safe operation of the blockchain system. For another example, for a federation chain, the authentication system may be deployed on all blockchain nodes with reference to a private chain. For example, for a private chain, since the number of blockchain nodes is relatively large, to ensure safe operation of the blockchain system, the authentication system may be deployed at some blockchain link points, for example, the authentication system is deployed at all the blockchain nodes, and the authentication system is deployed at some blockchain light nodes; alternatively, the authentication system is deployed on a small number of blockchain full nodes, and the authentication system is deployed on all blockchain light nodes.
In this embodiment, the trust evaluation kernel matrix is used to record trust authentication data of block chain link points to block chain nodes, where it should be noted that the authentication kernel 101 may also be used to group block chain link points in a block chain system, and each group of block chain link points records trust authentication data between all block chain nodes in the group; for the groups, one block link node can be selected from one group of block link points as an external connection node, the external connection node simultaneously belongs to another group of block link nodes, namely, the two groups of block link points have a common block link point, the number of the common block link point can be one or multiple, and the specific number of the common block link points can be flexibly configured according to the requirements of application scenes. For example, if the blockchain system is a public chain, the number of blockchain nodes in common in two groups of blockchain nodes is large because the blockchain system has higher visibility on the internet and is likely to have a security risk due to network attack. For the private chain and the alliance chain, the potential of security risk caused by network attack is small due to the fact that visibility of the private chain and the alliance chain on the internet is low, and therefore the number of the two groups of block link points which have the same block link point is one.
Optionally, in a specific embodiment, the core maintenance module 102 is further configured to switch the trust core matrix to other blockchain nodes in the blockchain system, the other blockchain nodes being different from the two blockchain nodes.
Optionally, in this embodiment, when the kernel maintenance module 102 switches the trust kernel matrix to another blockchain node in the blockchain system, it is preferable to switch to a neighboring blockchain node, that is, the other blockchain node is a neighboring blockchain node, and the neighboring blockchain node may be directly adjacent or indirectly adjacent. When indirectly adjacent, the number of neighbors can be controlled by setting the adjacent step size or the adjacent distance.
Further, when all blockchain nodes in the blockchain system are divided into several groups, the kernel maintenance module 102 performs the switching of the trust kernel matrix in the same group when switching the trust kernel matrix to other blockchain nodes in the blockchain system.
Further, as mentioned above, when two adjacent groups of blockchain nodes have a common blockchain node, the trust kernel matrix can be exchanged between the two adjacent groups of blockchain nodes through the common blockchain node.
Optionally, in a specific embodiment, the authentication system 10 disposed on the internet node further includes: and the network monitoring module is used for monitoring whether communication is performed between two block chain nodes in the block chain system, and if the communication is performed, the network monitoring module triggers an authentication system of an opposite terminal in the two block chain nodes of the authentication kernel 101 to perform authentication to obtain the trust evaluation kernel matrix.
As mentioned above, authentication is performed in this application in order to ensure that the internet node participates in the system operation as an integral part of the internet system, how to ensure the safe operation of the whole system based on the safety of the internet nodes, for this reason, when only two internet nodes have data interaction, this security issue is only considered, and for this reason, in this embodiment, by configuring the network monitoring module to monitor whether the communication between the blockchain nodes is performed, if communication exists, it is indicated that data interaction is about to occur between two block chain nodes or data interaction is being performed, and therefore, an authentication system of an opposite terminal of the two block chain nodes in the authentication kernel 101 is triggered to perform authentication to obtain the trust evaluation kernel matrix, otherwise, the authentication system of the opposite terminal of the two block chain nodes in the authentication kernel 101 does not need to be triggered to perform authentication to obtain the trust evaluation kernel matrix.
Optionally, in a specific embodiment, the network monitoring module is configured to monitor network traffic generated between two blockchain nodes in the blockchain system to monitor whether communication is performed between the two blockchain nodes in the blockchain system.
Optionally, in this embodiment, by monitoring the network traffic, it may be quickly monitored whether communication is performed between two blockchain nodes, that is, whether data interaction is about to occur or is being performed between two blockchain nodes.
Optionally, in a specific embodiment, the network monitoring module monitors network traffic generated between two blockchain nodes in the blockchain system by means of traffic interception.
Optionally, in this embodiment, by intercepting the network traffic, it may be quickly monitored whether communication is performed between two blockchain nodes, that is, whether data interaction is about to occur or is being performed between two blockchain nodes.
Optionally, in a specific embodiment, the network monitoring module is further configured to query a trust kernel matrix of an authentication system of an opposite end of the two blockchain nodes.
Optionally, the network monitoring module is used for monitoring communication between the blockchain nodes and also used as a channel for performing the trust kernel matrix exchange between the two blockchain nodes, so that the network architecture of the authentication system is simplified, and the data processing efficiency is improved.
Optionally, in a specific embodiment, the communication between two blockchain nodes is initiated based on an upper layer service component.
Optionally, in this embodiment, the communication monitored by the monitoring module is based on the last communication between the service components between the two block chain nodes, so that the accuracy of the authentication on the object is ensured, and further, the availability and the referential of the authentication result are ensured during the authentication.
Optionally, in a specific embodiment, the kernel maintenance module 102 is further configured to perform an update of the trust kernel matrix between two blockchain nodes through a decentralized authentication framework.
Optionally, in this embodiment, decentralized authentication may be implemented through a decentralized authentication framework, so that rapid authentication may be performed between two block chain nodes without any third party, thereby ensuring an update speed of the trust kernel matrix.
Optionally, in a specific embodiment, the authentication system 10 disposed on the internet node further includes: and the virtualized trusted management module is used for deriving the trust core matrix, so that the kernel maintenance module 102 updates the trust core matrix between the two block chain nodes.
Optionally, in this embodiment, a virtualized trusted-platform management module (VTPMS) may ensure that two block chain nodes perform fast switching of the trust kernel matrix, so as to ensure that the trust kernel matrix on any one block chain node is updated in real time, and ensure real-time performance and rapidity of switching.
Optionally, in a specific embodiment, an authentication system disposed on an internet node acts as a neuron.
Optionally, in a specific embodiment, the kernel maintenance module 102 is further configured to enable the frequently communicated plurality of block chain nodes to form a neuron authentication network, where all neurons share an upper layer service component.
Optionally, in this embodiment, by enabling a plurality of block chain nodes that communicate frequently to form a neuron authentication network and enabling all neurons in the neuron authentication network to share an upper layer service component, there may be an emphasis on determining an object to which an authentication is directed, so that it is preferable to authenticate only those block chain nodes that communicate frequently, and compared with authenticating all block chain nodes that communicate only in a block chain system, implementation efficiency of authentication is ensured.
Optionally, in this embodiment, since the communication behavior between the blockchain nodes changes in real time, and for this reason, the communication frequency also changes continuously, the composition of the neuron authentication network also changes dynamically.
Optionally, in a specific embodiment, the neuron authentication network has a uniform interface for providing proof of interaction services hosted between neurons in the neuron authentication network.
Optionally, in this embodiment, the unified interface may be configured on a blockchain node of the neuron authentication network having a higher authority or a higher security.
Example two
Referring to fig. 2, an embodiment of the present application provides a block chain system, including: a plurality of blockchain nodes 301, each having disposed thereon an authentication system 10 disposed on an internet node, comprising:
an authentication kernel 101 and a kernel maintenance module 102;
the authentication kernel 101 is configured to authenticate an authentication system at an opposite end to obtain a trust evaluation kernel matrix when two block link points communicate with each other, and store the trust evaluation kernel matrix; the kernel maintenance module 102 is configured to update the trust kernel matrix between two blockchain nodes.
Optionally, in this embodiment, a plurality of internet nodes may form a big data system, for example, the big data system is a blockchain system, and the blockchain system is, for example, a federation chain, a private chain, or a public chain; optionally, in this embodiment, the internet node includes a blockchain node 301, and the blockchain node 301 may be a blockchain light node and a blockchain full node. The block chain whole node is a node which possesses all transaction data of the whole network, and the block chain light node is a node which only possesses the transaction data related to the light node.
In this embodiment, it should be noted that, when a plurality of blockchain nodes 301 form a blockchain system, the authentication system may be deployed on only a part of the blockchain nodes 301, or the authentication system may be deployed on all the blockchain nodes 301. For example, for a private chain, since the number of blockchain nodes 301 is relatively small, to ensure safe operation of the blockchain system, the authentication system may be deployed on all blockchain nodes 301. For another example, for a federation chain, the authentication system described above may be deployed on all blockchain nodes 301 with reference to a private chain. For example, for a private chain, since the number of blockchain nodes 301 is relatively large, to ensure safe operation of the blockchain system, the authentication system may be deployed on some blockchain nodes 301, for example, the authentication system may be deployed on all blockchain nodes, and the authentication system may be deployed on some blockchain light nodes; alternatively, the authentication system is deployed on a small number of blockchain full nodes, and the authentication system is deployed on all blockchain light nodes.
In this embodiment, the trust evaluation core matrix is used to record trust authentication data of the blockchain nodes 301 to the blockchain link points 301, here, it should be noted that the authentication core 101 may also be used to group the blockchain link points 301 in the blockchain system, and each group of blockchain link points 301 records trust authentication data between all blockchain nodes 301 in the group; for groups, one block link node 301 may be selected from one group of block link points 301 as an external connection node, and the external connection node belongs to another group of block link nodes 301 at the same time, that is, two groups of block link points 301 have a common block link point 301, the number of the common block link points 301 may be one, or may also be multiple, and the specific number thereof is flexibly configured according to the requirements of the application scenario. For example, if the block chain system is a public chain, the visibility of the block chain system on the internet is higher, and the potential for security risk due to network attack is larger, so that the number of block chain nodes 301 in common in two groups of block chain nodes 301 is larger. For private and federation chains, the risk of security risk from network attacks is small due to the visibility of the private and federation chains across the internet, and therefore the two sets of block link points 301 have a common number of block link points 301 of one.
Optionally, in a specific embodiment, the core maintenance module 102 is further configured to switch the trust core matrix to other blockchain nodes 301 in the blockchain system, where the other blockchain nodes 301 are different from the two blockchain nodes 301.
Optionally, in this embodiment, when the core maintenance module 102 switches the trust core matrix to another blockchain node 301 in the blockchain system, it preferably switches to a neighboring blockchain node 301, that is, the other blockchain node 301 is the neighboring blockchain node 301, and the neighboring blockchain node 301 may be directly adjacent or indirectly adjacent. When indirectly adjacent, the number of neighbors can be controlled by setting the adjacent step size or the adjacent distance.
Further, when all blockchain nodes 301 in the blockchain system are divided into several groups, the kernel maintenance module 102 performs switching of the trust kernel matrix in the same group when switching the trust kernel matrix to other blockchain nodes 301 in the blockchain system.
Further, as described above, when two adjacent groups of block chain nodes 301 have a common block chain link point 301, the trust core matrix can be exchanged between the two adjacent groups of block chain nodes 301 through the common block chain link point 301.
Optionally, in a specific embodiment, the authentication system 10 disposed on the internet node further includes: and the network monitoring module is used for monitoring whether communication is performed between two blockchain nodes 301 in the blockchain system, and if the communication is performed, triggering an authentication system of an opposite end of the two blockchain nodes 301 in the authentication kernel 101 to perform authentication to obtain the trust evaluation kernel matrix.
As mentioned above, authentication is performed in this application in order to ensure that the internet node participates in the system operation as an integral part of the internet system, how to ensure the safe operation of the whole system based on the safety of the internet nodes, for this reason, the safety problem needs to be considered only when two internet nodes have data interaction, for this reason, in this embodiment, by configuring the network monitoring module to monitor whether communication between blockchain nodes 301 is occurring, if communication exists, it indicates that data interaction is about to occur between the two block chain nodes 301 or data interaction is being performed, and therefore, the authentication kernel 101 is triggered to perform authentication on the authentication system of the opposite terminal of the two block chain nodes 301 to obtain the trust evaluation kernel matrix, otherwise, the authentication kernel 101 is not required to be triggered to perform authentication on the authentication system of the opposite terminal of the two block chain nodes 301 to obtain the trust evaluation kernel matrix.
Optionally, in a specific embodiment, the network monitoring module is configured to monitor network traffic generated between two blockchain nodes 301 in the blockchain system, so as to monitor whether communication is performed between the two blockchain nodes 301 in the blockchain system.
Optionally, in this embodiment, by monitoring the network traffic, it may be quickly monitored whether communication is performed between the two blockchain nodes 301, that is, whether data interaction is about to occur or is being performed between the two blockchain nodes 301.
Optionally, in a specific embodiment, the network monitoring module monitors network traffic generated between two blockchain nodes 301 in the blockchain system by means of traffic interception.
Optionally, in this embodiment, by intercepting the network traffic, it may be quickly monitored whether communication is performed between the two blockchain nodes 301, that is, whether data interaction is about to occur or is being performed between the two blockchain nodes 301.
Optionally, in a specific embodiment, the network monitoring module is further configured to query a trust kernel matrix of an authentication system of an opposite end of the two blockchain nodes 301.
Optionally, the network monitoring module is used for monitoring communication between the blockchain nodes 301 and also used as a channel for performing the trust kernel matrix exchange between the two blockchain nodes 301, so that the network architecture of the authentication system is simplified, and the data processing efficiency is improved.
Optionally, in a specific embodiment, communication between two blockchain nodes 301 is initiated based on between upper layer service components.
Optionally, in this embodiment, the communication monitored by the monitoring module is communication between two block chain nodes 301 based on the last service component, so that accuracy of authentication on an object is ensured, and further, availability and referential of an authentication result are ensured during authentication.
Optionally, in a specific embodiment, the kernel maintenance module 102 is further configured to perform an update of the trust kernel matrix between the two blockchain nodes 301 through a decentralized authentication framework.
Optionally, in this embodiment, decentralized authentication may be implemented through a decentralized authentication framework, so that rapid authentication may be performed between two blockchain nodes 301 without any third party, thereby ensuring an update speed of the trust kernel matrix.
Optionally, in a specific embodiment, the authentication system 10 disposed on the internet node further includes: and the virtualized trusted management module is used for deriving the trust core matrix, so that the kernel maintenance module 102 updates the trust core matrix between the two block chain nodes 301.
Optionally, in this embodiment, a virtualized trusted-platform management module (VTPMS) may ensure that the two block chain nodes 301 perform fast switching of the trust kernel matrix, so as to ensure that the trust kernel matrix on any one block chain node 301 is updated in real time, and ensure real-time performance and rapidity of switching.
Optionally, in a specific embodiment, an authentication system disposed on an internet node acts as a neuron.
Optionally, in a specific embodiment, the kernel maintenance module 102 is further configured to enable the frequently communicating plurality of block chain nodes 301 to form a neuron authentication network, where all neurons share an upper layer service component.
Optionally, in this embodiment, by enabling a plurality of block chain nodes 301 that communicate frequently to form a neuron authentication network and enabling all neurons in the neuron authentication network to share an upper layer service component, there may be an emphasis on determining an object for which authentication is targeted, so that it is preferable to authenticate only those block chain nodes 301 that communicate frequently, and compared with authenticating all block chain nodes 301 that communicate only in a block chain system, implementation efficiency of authentication is ensured.
Optionally, in this embodiment, since the communication behavior between the blockchain nodes 301 changes in real time, and for this reason, the communication frequency also changes continuously, the composition of the neuron authentication network also changes dynamically.
Optionally, in a specific embodiment, the neuron authentication network has a uniform interface for providing proof of interaction services hosted between neurons in the neuron authentication network.
Optionally, in this embodiment, the unified interface may be configured on one blockchain node 301 of the neuron authentication network having a higher authority or a higher security.
EXAMPLE III
Referring to fig. 3, an embodiment of the present application provides an electronic device 30, including: a memory 301 and a processor 302, wherein the memory 301 stores computer-executable instructions, and the processor 302 is configured to execute the computer-executable instructions to perform the following steps:
when two block chain link points communicate, authenticating an authentication system at the opposite end to obtain a trust evaluation core matrix, and storing the trust evaluation core matrix;
and updating the trust kernel matrix between the two blockchain nodes.
Optionally, in this embodiment, a plurality of internet nodes may form a big data system, for example, the big data system is a blockchain system, and the blockchain system is, for example, a federation chain, a private chain, or a public chain; optionally, in this embodiment, the internet node includes a blockchain node, and the blockchain node may be a blockchain light node and a blockchain full node. The block chain whole node is a node which possesses all transaction data of the whole network, and the block chain light node is a node which only possesses the transaction data related to the light node.
In this embodiment, it should be noted that, when a plurality of blockchain nodes form a blockchain system, the authentication system may be deployed only on a part of blockchain nodes, or the authentication system may be deployed on all blockchain nodes. For example, for a private chain, since the number of blockchain nodes is relatively small, the authentication system may be deployed on all blockchain nodes in order to ensure safe operation of the blockchain system. For another example, for a federation chain, the authentication system may be deployed on all blockchain nodes with reference to a private chain. For example, for a private chain, since the number of blockchain nodes is relatively large, to ensure safe operation of the blockchain system, the authentication system may be deployed at some blockchain link points, for example, the authentication system is deployed at all the blockchain nodes, and the authentication system is deployed at some blockchain light nodes; alternatively, the authentication system is deployed on a small number of blockchain full nodes, and the authentication system is deployed on all blockchain light nodes.
In this embodiment, the trust evaluation core matrix is used to record trust authentication data of block link points to block link nodes, where it needs to be described that the block link points in the block link system may be grouped, and each group of block link points records trust authentication data between all block link nodes in the group; for the groups, one block link node can be selected from one group of block link points as an external connection node, the external connection node simultaneously belongs to another group of block link nodes, namely, the two groups of block link points have a common block link point, the number of the common block link point can be one or multiple, and the specific number of the common block link points can be flexibly configured according to the requirements of application scenes. For example, if the blockchain system is a public chain, the number of blockchain nodes in common in two groups of blockchain nodes is large because the blockchain system has higher visibility on the internet and is likely to have a security risk due to network attack. For the private chain and the alliance chain, the potential of security risk caused by network attack is small due to the fact that visibility of the private chain and the alliance chain on the internet is low, and therefore the number of the two groups of block link points which have the same block link point is one.
Optionally, in a specific embodiment, the step further comprises switching the trust core matrix to other blockchain nodes in the blockchain system, the other blockchain nodes being different from the two blockchain nodes.
Optionally, in this embodiment, when the trust kernel matrix is switched to another blockchain node in the blockchain system, it is preferably switched to a neighboring blockchain node thereof, that is, the other blockchain node is a neighboring blockchain node, and the neighboring blockchain node may be directly adjacent or indirectly adjacent. When indirectly adjacent, the number of neighbors can be controlled by setting the adjacent step size or the adjacent distance.
Further, when all blockchain nodes in the blockchain system are divided into a plurality of groups, the trust kernel matrix is switched to other blockchain nodes in the blockchain system, and the switching of the trust kernel matrix is performed in the same group.
Further, as mentioned above, when two adjacent groups of blockchain nodes have a common blockchain node, the trust kernel matrix can be exchanged between the two adjacent groups of blockchain nodes through the common blockchain node.
Optionally, in a specific embodiment, the method further includes monitoring whether communication is performed between two blockchain nodes in the blockchain system, and if communication is performed, triggering an authentication system of an opposite end of the two blockchain nodes to perform authentication to obtain the trust evaluation core matrix.
As described above, in the present application, authentication is performed to ensure that an internet node participates in system operation as a component of an internet system, how to ensure safe operation of the entire system based on security of the internet node itself, and therefore, only when two internet nodes have data interaction, the security problem needs to be considered.
Optionally, in a specific embodiment, the step further comprises monitoring network traffic generated between two blockchain nodes in the blockchain system to monitor whether communication is performed between the two blockchain nodes in the blockchain system.
Optionally, in this embodiment, by monitoring the network traffic, it may be quickly monitored whether communication is performed between two blockchain nodes, that is, whether data interaction is about to occur or is being performed between two blockchain nodes.
Optionally, in a specific embodiment, the step further comprises monitoring network traffic generated between two blockchain nodes in the blockchain system by means of traffic interception.
Optionally, in this embodiment, by intercepting the network traffic, it may be quickly monitored whether communication is performed between two blockchain nodes, that is, whether data interaction is about to occur or is being performed between two blockchain nodes.
Optionally, in a specific embodiment, the step further includes querying a trust kernel matrix of an authentication system of an opposite end of the two blockchain nodes.
Optionally, the network monitoring module is used for monitoring communication between the blockchain nodes and also used as a channel for performing the trust kernel matrix exchange between the two blockchain nodes, so that the network architecture of the authentication system is simplified, and the data processing efficiency is improved.
Optionally, in a specific embodiment, the communication between two blockchain nodes is initiated based on an upper layer service component.
Optionally, in this embodiment, the monitored communication is communication between two block chain nodes based on the last service component, so that accuracy of authentication on an object is ensured, and further, availability and referential of an authentication result are ensured when authentication is performed.
Optionally, in a specific embodiment, the step further comprises updating the trust kernel matrix between two blockchain nodes through a decentralized authentication framework.
Optionally, in this embodiment, decentralized authentication may be implemented through a decentralized authentication framework, so that rapid authentication may be performed between two block chain nodes without any third party, thereby ensuring an update speed of the trust kernel matrix.
Optionally, in a specific embodiment, the step further comprises deriving a trust core matrix, so that the kernel maintenance module performs the update of the trust core matrix between two block chain nodes.
Optionally, in this embodiment, the trust kernel matrix may be derived by a virtualized trusted management module (VTPMS) so that the kernel maintenance module updates the trust kernel matrix between two block chain nodes, and the virtualized trusted management module (VTPMS) may ensure that the two block chain nodes perform fast execution when performing exchange of the trust kernel matrix, thereby ensuring that the trust kernel matrix on any one block chain node is updated in real time, and ensuring real-time performance and fast performance of the exchange.
Optionally, in a specific embodiment, an authentication system disposed on an internet node acts as a neuron.
Optionally, in a specific embodiment, the step further comprises forming a neuron authentication network by a plurality of block chain nodes which communicate frequently, and sharing an upper layer service component by all neurons in the neuron authentication network.
Optionally, in this embodiment, by enabling a plurality of block chain nodes that communicate frequently to form a neuron authentication network and enabling all neurons in the neuron authentication network to share an upper layer service component, there may be an emphasis on determining an object to which an authentication is directed, so that it is preferable to authenticate only those block chain nodes that communicate frequently, and compared with authenticating all block chain nodes that communicate only in a block chain system, implementation efficiency of authentication is ensured.
Optionally, in this embodiment, since the communication behavior between the blockchain nodes changes in real time, and for this reason, the communication frequency also changes continuously, the composition of the neuron authentication network also changes dynamically.
Optionally, in a specific embodiment, the neuron authentication network has a uniform interface for providing proof of interaction services hosted between neurons in the neuron authentication network.
Optionally, in this embodiment, the unified interface may be configured on a blockchain node of the neuron authentication network having a higher authority or a higher security.
Referring to fig. 4, fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure; as shown in fig. 4, the hardware structure of the electronic device may include: a processor 401, a communication interface 402, a memory 403 and a communication bus 404;
the processor 401, the communication interface 402 and the memory 403 complete mutual communication through the communication bus 404;
optionally, the communication interface 402 may be an interface of a communication module, such as an interface of a GSM module;
the processor 401 may be specifically configured to execute the executable program stored in the memory 403, so as to perform all or part of the processing steps of any of the above method embodiments.
Processor 401 may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The electronic device of the embodiments of the present application exists in various forms, including but not limited to:
(1) mobile communication devices, which are characterized by mobile communication capabilities and are primarily targeted at providing voice and data communications. Such terminals include smart phones (e.g., iphones), multimedia phones, functional phones, and low-end phones, among others.
(2) The ultra-mobile personal computer equipment belongs to the category of personal computers, has calculation and processing functions and generally has the characteristic of mobile internet access. Such terminals include PDA, MID, and UMPC devices, such as ipads.
(3) Portable entertainment devices such devices may display and play multimedia content. Such devices include audio and video players (e.g., ipods), handheld game consoles, electronic books, as well as smart toys and portable car navigation devices.
(4) The server is similar to a general computer architecture, but has higher requirements on processing capability, stability, reliability, safety, expandability, manageability and the like because of the need of providing highly reliable services.
(4) And other electronic devices with data interaction functions.
In the present embodiment, the processor 401 may take the form of, for example, a microprocessor or a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic processor, and an embedded microprocessor, examples of which include, but are not limited to, the following microprocessors: ARC 624D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8041F320, the memory processor may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing a processor as pure computer readable program code, the same functions may be implemented entirely by logically programming method steps such that the processor is in the form of logic gates, switches, application specific integrated circuits, programmable logic processors, embedded microprocessors, etc. Such a processor may thus be regarded as a hardware component and the means for performing the various functions included therein may also be regarded as structures within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
Example four
Referring to fig. 5, an embodiment of the present application provides a computer storage medium having computer-executable instructions stored thereon, where the computer-executable instructions, when executed, implement the following steps:
when two block chain link points communicate, authenticating an authentication system at the opposite end to obtain a trust evaluation core matrix, and storing the trust evaluation core matrix;
and updating the trust kernel matrix between the two blockchain nodes.
Optionally, in this embodiment, a plurality of internet nodes may form a big data system, for example, the big data system is a blockchain system, and the blockchain system is, for example, a federation chain, a private chain, or a public chain; optionally, in this embodiment, the internet node includes a blockchain node, and the blockchain node may be a blockchain light node and a blockchain full node. The block chain whole node is a node which possesses all transaction data of the whole network, and the block chain light node is a node which only possesses the transaction data related to the light node.
In this embodiment, it should be noted that, when a plurality of blockchain nodes form a blockchain system, the authentication system may be deployed only on a part of blockchain nodes, or the authentication system may be deployed on all blockchain nodes. For example, for a private chain, since the number of blockchain nodes is relatively small, the authentication system may be deployed on all blockchain nodes in order to ensure safe operation of the blockchain system. For another example, for a federation chain, the authentication system may be deployed on all blockchain nodes with reference to a private chain. For example, for a private chain, since the number of blockchain nodes is relatively large, to ensure safe operation of the blockchain system, the authentication system may be deployed at some blockchain link points, for example, the authentication system is deployed at all the blockchain nodes, and the authentication system is deployed at some blockchain light nodes; alternatively, the authentication system is deployed on a small number of blockchain full nodes, and the authentication system is deployed on all blockchain light nodes.
In this embodiment, the trust evaluation core matrix is used to record trust authentication data of block link points to block link nodes, where it needs to be described that the block link points in the block link system may be grouped, and each group of block link points records trust authentication data between all block link nodes in the group; for the groups, one block link node can be selected from one group of block link points as an external connection node, the external connection node simultaneously belongs to another group of block link nodes, namely, the two groups of block link points have a common block link point, the number of the common block link point can be one or multiple, and the specific number of the common block link points can be flexibly configured according to the requirements of application scenes. For example, if the blockchain system is a public chain, the number of blockchain nodes in common in two groups of blockchain nodes is large because the blockchain system has higher visibility on the internet and is likely to have a security risk due to network attack. For the private chain and the alliance chain, the potential of security risk caused by network attack is small due to the fact that visibility of the private chain and the alliance chain on the internet is low, and therefore the number of the two groups of block link points which have the same block link point is one.
Optionally, in a specific embodiment, the step further comprises switching the trust core matrix to other blockchain nodes in the blockchain system, the other blockchain nodes being different from the two blockchain nodes.
Optionally, in this embodiment, when the trust kernel matrix is switched to another blockchain node in the blockchain system, it is preferably switched to a neighboring blockchain node thereof, that is, the other blockchain node is a neighboring blockchain node, and the neighboring blockchain node may be directly adjacent or indirectly adjacent. When indirectly adjacent, the number of neighbors can be controlled by setting the adjacent step size or the adjacent distance.
Further, when all blockchain nodes in the blockchain system are divided into a plurality of groups, the trust kernel matrix is switched to other blockchain nodes in the blockchain system, and the switching of the trust kernel matrix is performed in the same group.
Further, as mentioned above, when two adjacent groups of blockchain nodes have a common blockchain node, the trust kernel matrix can be exchanged between the two adjacent groups of blockchain nodes through the common blockchain node.
Optionally, in a specific embodiment, the method further includes monitoring whether communication is performed between two blockchain nodes in the blockchain system, and if communication is performed, triggering an authentication system of an opposite end of the two blockchain nodes to perform authentication to obtain the trust evaluation core matrix.
As described above, in the present application, authentication is performed to ensure that an internet node participates in system operation as a component of an internet system, how to ensure safe operation of the entire system based on security of the internet node itself, and therefore, only when two internet nodes have data interaction, the security problem needs to be considered.
Optionally, in a specific embodiment, the step further comprises monitoring network traffic generated between two blockchain nodes in the blockchain system to monitor whether communication is performed between the two blockchain nodes in the blockchain system.
Optionally, in this embodiment, by monitoring the network traffic, it may be quickly monitored whether communication is performed between two blockchain nodes, that is, whether data interaction is about to occur or is being performed between two blockchain nodes.
Optionally, in a specific embodiment, the step further comprises monitoring network traffic generated between two blockchain nodes in the blockchain system by means of traffic interception.
Optionally, in this embodiment, by intercepting the network traffic, it may be quickly monitored whether communication is performed between two blockchain nodes, that is, whether data interaction is about to occur or is being performed between two blockchain nodes.
Optionally, in a specific embodiment, the step further includes querying a trust kernel matrix of an authentication system of an opposite end of the two blockchain nodes.
Optionally, the network monitoring module is used for monitoring communication between the blockchain nodes and also used as a channel for performing the trust kernel matrix exchange between the two blockchain nodes, so that the network architecture of the authentication system is simplified, and the data processing efficiency is improved.
Optionally, in a specific embodiment, the communication between two blockchain nodes is initiated based on an upper layer service component.
Optionally, in this embodiment, the monitored communication is communication between two block chain nodes based on the last service component, so that accuracy of authentication on an object is ensured, and further, availability and referential of an authentication result are ensured when authentication is performed.
Optionally, in a specific embodiment, the step further comprises updating the trust kernel matrix between two blockchain nodes through a decentralized authentication framework.
Optionally, in this embodiment, decentralized authentication may be implemented through a decentralized authentication framework, so that rapid authentication may be performed between two block chain nodes without any third party, thereby ensuring an update speed of the trust kernel matrix.
Optionally, in a specific embodiment, the step further comprises deriving a trust core matrix, so that the kernel maintenance module performs the update of the trust core matrix between two block chain nodes.
Optionally, in this embodiment, the trust kernel matrix may be derived by a virtualized trusted management module (VTPMS) so that the kernel maintenance module updates the trust kernel matrix between two block chain nodes, and the virtualized trusted management module (VTPMS) may ensure that the two block chain nodes perform fast execution when performing exchange of the trust kernel matrix, thereby ensuring that the trust kernel matrix on any one block chain node is updated in real time, and ensuring real-time performance and fast performance of the exchange.
Optionally, in a specific embodiment, an authentication system disposed on an internet node acts as a neuron.
Optionally, in a specific embodiment, the step further comprises forming a neuron authentication network by a plurality of block chain nodes which communicate frequently, and sharing an upper layer service component by all neurons in the neuron authentication network.
Optionally, in this embodiment, by enabling a plurality of block chain nodes that communicate frequently to form a neuron authentication network and enabling all neurons in the neuron authentication network to share an upper layer service component, there may be an emphasis on determining an object to which an authentication is directed, so that it is preferable to authenticate only those block chain nodes that communicate frequently, and compared with authenticating all block chain nodes that communicate only in a block chain system, implementation efficiency of authentication is ensured.
Optionally, in this embodiment, since the communication behavior between the blockchain nodes changes in real time, and for this reason, the communication frequency also changes continuously, the composition of the neuron authentication network also changes dynamically.
Optionally, in a specific embodiment, the neuron authentication network has a uniform interface for providing proof of interaction services hosted between neurons in the neuron authentication network.
Optionally, in this embodiment, the unified interface may be configured on a blockchain node of the neuron authentication network having a higher authority or a higher security.
The application discloses an authentication system arranged on an internet node, a block chain system and related products, wherein the authentication system arranged on the internet node is deployed on a block chain node in the block chain system; the authentication system provided on an internet node includes: the system comprises an authentication kernel and a kernel maintenance module; the system comprises an authentication kernel, a trust evaluation kernel matrix and a trust evaluation kernel matrix, wherein the authentication kernel is used for authenticating an authentication system at a peer end to obtain the trust evaluation kernel matrix when two block link points communicate, and storing the trust evaluation kernel matrix; the kernel maintenance module is used for updating the trust kernel matrix between the two block chain nodes. The authentication system arranged on the internet node, the block chain system and the related products can effectively simplify the authentication process of the block chain node and improve the authentication efficiency of the block chain node.
In addition, computer storage media, including both permanent and non-permanent, removable and non-removable media, may implement the information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer storage media does not include transitory computer readable media (transient media) such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular transactions or implement particular abstract data types. The application may also be practiced in distributed computing environments where transactions are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
It should be noted that, in the present specification, all the embodiments are described in a progressive manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the apparatus and system embodiments, since they are substantially similar to the method embodiments, they are described in a relatively simple manner, and reference may be made to some of the descriptions of the method embodiments for related points. The above-described embodiments of the apparatus and system are merely illustrative, and the modules illustrated as separate components may or may not be physically separate, and the components suggested as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
The above description is only one specific embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present application should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. An authentication system arranged on an internet node, wherein the authentication system arranged on the internet node is deployed on a blockchain node in a blockchain system;
the authentication system provided on the internet node includes: the system comprises an authentication kernel and a kernel maintenance module;
the authentication kernel is used for authenticating an authentication system at the opposite end to obtain a trust evaluation kernel matrix when two block link points communicate, and storing the trust evaluation kernel matrix; the kernel maintenance module is used for updating the trust kernel matrix between the two block chain nodes.
2. The authentication system disposed on an internet node as recited in claim 1, wherein the kernel maintenance module is further configured to switch the trust kernel matrix to other blockchain nodes in the blockchain system, the other blockchain nodes being different from the two blockchain nodes.
3. The authentication system provided on an internet node according to claim 1, wherein the authentication system provided on an internet node further comprises: and the network monitoring module is used for monitoring whether communication is performed between the two block chain nodes in the block chain system, and if the communication is performed, the network monitoring module triggers the authentication kernel to authenticate the authentication system of the opposite end of the two block chain nodes to obtain the trust evaluation kernel matrix.
4. The authentication system as claimed in claim 3, wherein the network monitoring module is configured to monitor network traffic generated between the two blockchain nodes in the blockchain system to monitor whether communication is performed between the two blockchain nodes in the blockchain system.
5. An authentication system provided on an internet node according to any one of claims 1 to 4, wherein an authentication system provided on an internet node acts as a neuron.
6. The authentication system disposed on an internet node as claimed in claim 5, wherein the kernel maintenance module is further configured to enable a plurality of block chain nodes which communicate frequently to form a neuron authentication network, and all neurons in the neuron authentication network share an upper layer service component.
7. The authentication system as set forth in claim 6, wherein said neuron authentication network has a uniform interface for providing proof of interaction services hosted between said neurons in said neuron authentication network.
8. A blockchain system, comprising: a plurality of block chain nodes, each block chain node having deployed thereon an authentication system disposed on an internet node, comprising:
the system comprises an authentication kernel and a kernel maintenance module;
the authentication kernel is used for authenticating an authentication system at the opposite end to obtain a trust evaluation kernel matrix when two block link points communicate, and storing the trust evaluation kernel matrix; the kernel maintenance module is used for updating the trust kernel matrix between the two block chain nodes.
9. An electronic device, comprising: a memory having computer-executable instructions stored thereon and a processor for executing the computer-executable instructions to perform the steps of:
when two block chain link points communicate, authenticating an authentication system at the opposite end to obtain a trust evaluation core matrix, and storing the trust evaluation core matrix;
and updating the trust kernel matrix between the two blockchain nodes.
10. A computer storage medium having computer-executable instructions stored thereon that, when executed, perform the steps of:
when two block chain link points communicate, authenticating an authentication system at the opposite end to obtain a trust evaluation core matrix, and storing the trust evaluation core matrix;
and updating the trust kernel matrix between the two blockchain nodes.
CN202011615073.3A 2020-12-30 2020-12-30 Authentication system, blockchain system and related products arranged on Internet node Active CN112788117B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011615073.3A CN112788117B (en) 2020-12-30 2020-12-30 Authentication system, blockchain system and related products arranged on Internet node

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011615073.3A CN112788117B (en) 2020-12-30 2020-12-30 Authentication system, blockchain system and related products arranged on Internet node

Publications (2)

Publication Number Publication Date
CN112788117A true CN112788117A (en) 2021-05-11
CN112788117B CN112788117B (en) 2023-04-28

Family

ID=75754151

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011615073.3A Active CN112788117B (en) 2020-12-30 2020-12-30 Authentication system, blockchain system and related products arranged on Internet node

Country Status (1)

Country Link
CN (1) CN112788117B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110277014A1 (en) * 2010-05-10 2011-11-10 Northeastern University Technology Transfer Center Node authentication
CN108737436A (en) * 2018-05-31 2018-11-02 西安电子科技大学 Based on the cross-domain services device identity identifying method for trusting alliance's block chain
CN109495516A (en) * 2019-01-07 2019-03-19 国网江苏省电力有限公司无锡供电分公司 Electric power internet-of-things terminal cut-in method based on block chain
US20190386975A1 (en) * 2017-06-19 2019-12-19 Alibaba Group Holding Limited Authentication method and device, and blockchain-based authentication data processing method and device
CN110958118A (en) * 2019-10-12 2020-04-03 平安国际智慧城市科技股份有限公司 Certificate authentication management method, device, equipment and computer readable storage medium
CN112134883A (en) * 2020-09-22 2020-12-25 北京八分量信息科技有限公司 Method and device for quickly authenticating trust relationship between nodes based on trusted computing and related products

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110277014A1 (en) * 2010-05-10 2011-11-10 Northeastern University Technology Transfer Center Node authentication
US20190386975A1 (en) * 2017-06-19 2019-12-19 Alibaba Group Holding Limited Authentication method and device, and blockchain-based authentication data processing method and device
CN108737436A (en) * 2018-05-31 2018-11-02 西安电子科技大学 Based on the cross-domain services device identity identifying method for trusting alliance's block chain
CN109495516A (en) * 2019-01-07 2019-03-19 国网江苏省电力有限公司无锡供电分公司 Electric power internet-of-things terminal cut-in method based on block chain
CN110958118A (en) * 2019-10-12 2020-04-03 平安国际智慧城市科技股份有限公司 Certificate authentication management method, device, equipment and computer readable storage medium
CN112134883A (en) * 2020-09-22 2020-12-25 北京八分量信息科技有限公司 Method and device for quickly authenticating trust relationship between nodes based on trusted computing and related products

Also Published As

Publication number Publication date
CN112788117B (en) 2023-04-28

Similar Documents

Publication Publication Date Title
US20230353357A1 (en) Traceable key block-chain ledger
Shammar et al. A survey of IoT and blockchain integration: Security perspective
EP3857373A1 (en) Blockchain-based resource allocation method and apparatus
TWI725709B (en) Data storage method, device and equipment
US11423473B2 (en) Blockchain-based leasing
EP3598333B1 (en) Electronic device update management
US11809551B2 (en) Highly scalable permissioned block chains
US11861612B2 (en) Blockchain-based offline resource transfer method and apparatus
Hashmi et al. Towards sybil resistant authentication in mobile ad hoc networks
Mukhandi et al. Blockchain-based device identity management with consensus authentication for IoT devices
CN113935737B (en) Random number generation method and device based on block chain
CN113259464B (en) Method for building block chain sub-network and block chain system
CN112565303B (en) Method and device for performing authentication connection between block chain nodes and related product
CN112788117B (en) Authentication system, blockchain system and related products arranged on Internet node
Dey et al. Security and privacy issues in mobile cloud computing
CN115391801A (en) Method and device for updating encryption module in block chain system and related products
CN112650715A (en) Method, device and related product for storing data in block chain system
CN114978651A (en) Privacy calculation evidence storage method and device, electronic equipment and storage medium
CN112866343B (en) Trust propagation method and system in internet node and related products
CN112804088B (en) Method, system and related product for internet node authentication based on neighbor credibility
Roy et al. Blockchain scalability: solutions, challenges and future possibilities
US20240106839A1 (en) Cyber-physical protections for edge computing platforms
CN112688960B (en) Method, system and related product for calculating connection strength in internet node authentication
CN112804305B (en) Credible networking method and system of internet node and related product
Mosemann Assessing Security Risks with the Internet of Things

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant