CN116028985A - Calculation force verification method, device and system - Google Patents
Calculation force verification method, device and system Download PDFInfo
- Publication number
- CN116028985A CN116028985A CN202211664166.4A CN202211664166A CN116028985A CN 116028985 A CN116028985 A CN 116028985A CN 202211664166 A CN202211664166 A CN 202211664166A CN 116028985 A CN116028985 A CN 116028985A
- Authority
- CN
- China
- Prior art keywords
- computing power
- resource information
- computing
- power resource
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 title claims abstract description 126
- 238000000034 method Methods 0.000 title claims abstract description 77
- 238000004364 calculation method Methods 0.000 title claims abstract description 30
- 230000007246 mechanism Effects 0.000 claims abstract description 86
- 238000004590 computer program Methods 0.000 claims description 6
- 238000010200 validation analysis Methods 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 9
- 230000005540 biological transmission Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000014509 gene expression Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000004422 calculation algorithm Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
Images
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides a method, a device and a system for verifying calculation force, wherein the method comprises the following steps: receiving second computing power resource information sent by a computing power provider, wherein the second computing power resource information is sent after the computing power provider sends first computing power resource information to a computing power management mechanism to finish computing power resource recording; and completing computing power verification according to the comparison result of the second computing power resource information and the first computing power resource information. The method, the device and the system can solve the problem that the existing power transaction platform lacks a method for verifying power resources.
Description
Technical Field
The invention relates to a method, a device and a system for verifying calculation force.
Background
The current development of computing power presents diversified and ubiquitous characteristics, besides general computing power, the occupation ratio of intelligent computing power is higher and higher, and computing power resources are developed from a centralized deployment mode to a multi-level direction. In the existing computing power transaction method, the used computing power resources are difficult to verify, so that a computing power transaction platform lacks a method and means for verifying the computing power resources.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a method, a device and a system for verifying the computational power aiming at the defects in the prior art, and the method, the device and the system for verifying the computational power are used for comparing the computational power resource information sent by the computational power provider with the computational power resource information recorded by the computational power provider in a computational power management structure so as to verify the computational power, so that the problem that the conventional computational power transaction platform lacks a method for verifying the computational power resource is solved.
In a first aspect, the present invention provides a method for verifying computing power, applied to a computing power transaction platform, including:
receiving second computing power resource information sent by a computing power provider, wherein the second computing power resource information is sent after the computing power provider sends first computing power resource information to a computing power management mechanism to finish computing power resource recording;
and completing computing power verification according to the comparison result of the second computing power resource information and the first computing power resource information.
Preferably, the first and second computing power resource information includes at least one of:
chip identification code ID, chip type, main frequency, memory, standard server information, standard rack information and standard data center information.
Preferably, before the computing power verification is completed according to the comparison result of the second computing power resource information and the first computing power resource information, the method further includes:
comparing the second computing power resource information with the first computing power resource information to obtain a comparison result; or,
and sending the second computing power resource information to the computing power management mechanism, and receiving the comparison result sent after the computing power management mechanism compares the second computing power resource information with the first computing power resource information.
Preferably, the comparing the second computing power resource information with the first computing power resource information to be recorded further includes, before obtaining the comparison result:
and receiving the first recorded computing resource information sent by the computing management mechanism.
Preferably, the receiving the second computing power resource information sent by the computing power provider further includes, simultaneously or after:
receiving a first digital signature and a first digital certificate sent by a computing power provider, wherein the first digital signature is generated and sent according to a first private key and second computing power resource information after the first public key and the first private key are generated by the computing power provider, and the first digital certificate is generated and sent according to the first public key after the first public key and the first private key are generated by the computing power provider;
Verifying the first digital signature according to a first public key in the first digital certificate;
and after the verification is passed, comparing the second computing power resource information with the first computing power resource information to finish computing power verification.
Preferably, before the sending the second computing resource information to the computing management mechanism, the method further includes:
generating a second public key and a second private key;
generating a second digital certificate according to the second public key;
and generating a second digital signature according to the second private key.
Preferably, at the same time or after the sending the second computing resource information to the computing management mechanism, the method further includes:
and sending the second digital signature and the second digital certificate to a computing management mechanism so that the computing management mechanism verifies the second digital signature according to a second public key in the second digital certificate and compares the second computing resource information with the first computing resource information after the second digital signature and the second digital certificate pass through the second public key to complete computing verification.
In a second aspect, the present invention also provides a computing power verification method, applied to a computing power provider, including:
transmitting the first computing resource information to a computing management mechanism to finish computing resource record;
And sending the second computing power resource information to a computing power transaction platform so that the computing power transaction platform can finish computing power verification according to a comparison result of the second computing power resource information and the first computing power resource information.
Preferably, before the sending the second computing power resource information to the computing power transaction platform, the method further includes:
generating a first public key and a first private key;
generating a first digital certificate according to the first public key;
and generating a first digital signature according to the first private key.
Preferably, the sending the second computing power resource information to the computing power trading platform simultaneously or later further includes:
and sending the first digital certificate and the first digital signature to the power computing transaction platform, so that the power computing transaction platform verifies the first digital signature according to a first public key in the first digital certificate, and after verification is passed, comparing the second power computing resource information with the first power computing resource information to complete power computing verification.
In a third aspect, the present invention also provides a method for verifying a computing force, applied to a computing force management mechanism, including:
and receiving first computing power resource information sent by a computing power provider and completing computing power resource record so that the computing power transaction platform completes computing power verification according to a comparison result of the second computing power resource information and the first computing power resource information after receiving the second computing power resource information sent by the computing power provider.
Preferably, after receiving the first computing power resource information sent by the computing power provider and completing the computing power resource record, the method further includes:
sending the first recorded computing power resource information to the computing power transaction platform; or,
and receiving the second computing power resource information sent by the computing power trading platform, comparing the second computing power resource information with the first computing power resource information, and then sending a comparison result to the computing power trading platform.
Preferably, the receiving the second computing power resource information sent by the computing power trading platform simultaneously or later further includes:
receiving a second digital certificate and a second digital signature sent by the computing power transaction platform, wherein the second digital signature is generated and sent according to a second private key and first computing power resource information after a second public key and a second private key are generated by a computing power provider, and the second digital signature is generated and sent according to a second public key after the second public key and the second private key are generated by the computing power provider;
verifying the second digital signature according to a second public key in the second digital certificate;
and after the verification is passed, comparing the first computing power resource information with the second computing power resource information to finish computing power verification.
In a fourth aspect, the present invention further provides a computing power verification device, provided on a computing power transaction platform, including:
the first receiving module is used for receiving second computing power resource information sent by a computing power provider, wherein the second computing power resource information is sent by the computing power provider after the first computing power resource information is sent to a computing power management mechanism to finish computing power resource recording;
and the first verification module is connected with the first receiving module and is used for completing calculation verification according to the comparison result of the second calculation resource information and the first calculation resource information.
In a fifth aspect, the present invention further provides a computing power verification apparatus, provided to a computing power provider, including:
the first sending module is used for sending the first computing power resource information to the computing power management mechanism so as to finish computing power resource record;
the second sending module is connected with the first sending module and is used for sending second computing power resource information to the computing power transaction platform so that the computing power transaction platform can complete computing power verification according to a comparison result of the second computing power resource information and the first computing power resource information.
In a sixth aspect, the present invention also provides a computing force verification device, provided in a computing force management mechanism, including:
The second receiving module is used for receiving the first computing power resource information sent by the computing power provider and completing computing power resource record so that the computing power transaction platform completes computing power verification according to the comparison result of the second computing power resource information and the first computing power resource information after receiving the second computing power resource information sent by the computing power provider
In a seventh aspect, the present invention also provides a computing power verification apparatus, comprising a memory and a processor, the memory storing a computer program, the processor being arranged to run the computer program to implement the computing power verification method of the first aspect, or to implement the computing power verification method of the second aspect, or to implement the computing power verification method of the third aspect.
In an eighth aspect, the present invention further provides a computing force verification system, including a computing force transaction platform, a computing force provider, and a computing force management mechanism;
the computing power transaction platform is used for executing the computing power verification method in the first aspect;
the computing power provider is used for executing the computing power verification method in the second aspect;
the calculation force management mechanism is configured to execute the calculation force verification method described in the third aspect.
The method, the device and the system for verifying the computational power, provided by the invention, are characterized in that a computational power transaction platform receives second computational power resource information sent by a computational power provider, wherein the second computational power resource information is sent by the computational power provider after the first computational power resource information is sent to a computational power management mechanism by the computational power provider so as to finish the filing of computational power resources; according to the comparison result of the second computing power resource information and the first computing power resource information, the computing power verification is completed.
Drawings
FIG. 1 is a flow chart of a method for verifying computing power according to embodiment 1 of the present invention;
FIG. 2 is a flow chart of a method for verifying computing power according to embodiment 2 of the present invention;
FIG. 3 is a flow chart of a method for verifying computing power according to embodiment 3 of the present invention;
fig. 4 is a schematic structural diagram of a computing force verification device according to embodiment 4 of the present invention;
FIG. 5 is a schematic diagram of a force verification device according to embodiment 5 of the present invention;
Fig. 6 is a schematic structural diagram of a computing force verification device according to embodiment 6 of the present invention;
fig. 7 is a schematic structural diagram of a computing force verification device according to embodiment 7 of the present invention;
fig. 8 is a schematic structural diagram of a computing force verification system according to embodiment 8 of the present invention.
Detailed Description
In order to make the technical scheme of the present invention better understood by those skilled in the art, the following detailed description of the embodiments of the present invention will be given with reference to the accompanying drawings.
It is to be understood that the specific embodiments and figures described herein are merely illustrative of the invention, and are not limiting of the invention.
It is to be understood that the various embodiments of the invention and the features of the embodiments may be combined with each other without conflict.
It is to be understood that only the portions relevant to the present invention are shown in the drawings for convenience of description, and the portions irrelevant to the present invention are not shown in the drawings.
It should be understood that each unit and module in the embodiments of the present invention may correspond to only one physical structure, may be formed by a plurality of physical structures, or may be integrated into one physical structure.
It will be appreciated that, without conflict, the functions and steps noted in the flowcharts and block diagrams of the present invention may occur out of the order noted in the figures.
It is to be understood that the flowcharts and block diagrams of the present invention illustrate the architecture, functionality, and operation of possible implementations of systems, apparatuses, devices, methods according to various embodiments of the present invention. Where each block in the flowchart or block diagrams may represent a unit, module, segment, code, or the like, which comprises executable instructions for implementing the specified functions. Moreover, each block or combination of blocks in the block diagrams and flowchart illustrations can be implemented by hardware-based systems that perform the specified functions, or by combinations of hardware and computer instructions.
It should be understood that the units and modules related in the embodiments of the present invention may be implemented by software, or may be implemented by hardware, for example, the units and modules may be located in a processor.
Example 1:
the embodiment provides a computing power verification method, which is applied to a computing power transaction platform, as shown in fig. 1, and comprises the following steps:
step S011: receiving second computing power resource information sent by a computing power provider, wherein the second computing power resource information is sent after the computing power provider sends first computing power resource information to a computing power management mechanism to finish computing power resource recording;
In this embodiment, the power provider needs to put its own power resource on the power transaction platform, and the power management mechanism is a supervision mechanism for the power resource, and the power provider can only purchase the power resource and sell the power resource on the power transaction platform after recording the power resource.
Optionally, the first and second computing power resource information includes at least one of:
chip identification code ID (Identity document), chip type, main frequency, memory, standard server information, standard rack information, and standard data center information.
In this embodiment, the computing power resource information may be a chip of a minimum computing power entity unit, and the first computing power resource information and the second computing power resource information may include: the information of chip ID, type, main frequency, memory, etc. it is generally considered that the general-purpose computing power chip is a CPU (central processing unit ), the intelligent computing power chip is a GPU (graphics processing unit, graphics processor), an FPGA (Field Programmable Gate Array ), an ASIC (Application Specific Integrated Circuit, application specific integrated circuit), etc., and the quantum chip and brain-like chip are possible computing power resources in the future.
The computing power resource information can also be in a larger-level expression form such as a standard server, a standard rack, a standard data center and the like, and when the computing power chip information is recorded, the computing power chip information is recorded at the same time.
Step S012: and completing computing power verification according to the comparison result of the second computing power resource information and the first computing power resource information.
In this embodiment, the power provider may record all the power resource information of the power management mechanism as the first power resource information, upload the power resource information required to be sold on the power transaction platform as the second power resource information, and when the power verification is performed, the power resources in the second power resource information can find the corresponding information in the first power resource information.
In this embodiment, if the result of the calculation force verification is false, the calculation force provider may be penalized, for example, the reputation score may be deducted; if true, the power transaction platform can put the power of the power provider on shelf.
Optionally, before the computing power verification is completed according to the comparison result of the second computing power resource information and the first computing power resource information, the method further includes:
Comparing the second computing power resource information with the first computing power resource information to obtain a comparison result; or,
and sending the second computing power resource information to the computing power management mechanism, and receiving the comparison result sent after the computing power management mechanism compares the second computing power resource information with the first computing power resource information.
In this embodiment, the verification of the power resource information may be divided into an external verification method and a local verification method, where the external verification method is that the power transaction platform sends the second power resource information to the power management mechanism, and the power management mechanism performs verification and returns a verification result; the local verification method is that the first computing power resource information of the computing power management mechanism is downloaded to the local in advance by the computing power transaction platform, and when the computing power provider reports the computing power resource information, the computing power transaction platform verifies according to the computing power resource information backed up locally.
Optionally, the comparing the second computing power resource information with the first computing power resource information to be recorded further includes, before obtaining the comparison result:
and receiving the first recorded computing resource information sent by the computing management mechanism.
In this embodiment, the manner of receiving the first computing resource information may be that the computing transaction platform requests the first computing resource data recorded by the computing management mechanism from the computing management mechanism, or that the computing management mechanism sends updated content to the computing transaction platform when the first computing resource data recorded by the computing management mechanism changes.
Optionally, the receiving, simultaneously or after the second computing power resource information sent by the computing power provider, further includes:
receiving a first digital signature and a first digital certificate sent by a computing power provider, wherein the first digital signature is generated and sent according to a first private key and second computing power resource information after the first public key and the first private key 5 are generated by the computing power provider, and the first digital certificate is generated and sent according to the first public key after the first public key and the first private key are generated by the computing power provider;
verifying the first digital signature according to a first public key in the first digital certificate;
and after the 0 verification is passed, comparing the second computing power resource information with the first computing power resource information to finish computing power verification.
In this embodiment, the computing power provider sends the second computing power resource information, the first digital certificate and the first digital signature, and may send the three simultaneously in a message, for example, send the following message: 5INFO i |sig{PR i ,INFO i }|C{PU i }
Wherein PU i PR as the first public key i C { PU for first private key i Is a first digital certificate, which may be generated by a digital certificate authority, sig { PR } i ,INFO i First digital signature, INFO i Is the second computing power resource information.
In this embodiment, verification of the digital signature may ensure that the authenticity of the data source is 0 and that the data has not been altered during transmission.
Optionally, before the sending the second computing resource information to the computing management mechanism, the method further includes:
generating a second public key and a second private key;
generating a second digital certificate according to the second public key;
and 5, generating a second digital signature according to the second private key.
Optionally, at the same time or after the sending the second computing power resource information to the computing power management mechanism, the method further includes:
and sending the second digital signature and the second digital certificate to a computing management mechanism so that the computing management mechanism verifies the 0 second digital signature according to a second public key in the second digital certificate and compares the second computing resource information with the first computing resource information after the 0 second digital signature passes through the second public key in the second digital certificate to complete computing verification.
In this embodiment, the power transaction platform sends the second power resource information, the second digital certificate and the second digital signature, and the three may be sent simultaneously in a message, and the number of the power provider may be added to the message to enable the power management mechanism to quickly query.
In a specific embodiment, the method of computing force verification may include the steps of:
in step S101, the computing power provider records computing power resource information to the computing power management mechanism, and the computing power provider records all computing power resource information to the computing power management mechanism.
The power management mechanism is a supervision mechanism for the power resources, and the power provider can only purchase and construct the power resources after recording the power resources.
The computing power resource information may be a chip of a minimum computing power entity unit, and the registered information may include: the information of chip ID, type, main frequency, memory, etc. is generally considered that the general power chip is CPU, the intelligent power chip is GPU, FPGA, ASIC, etc., and the quantum chip and brain-like chip are possible power resources in the future.
The computing power resource information can also be in the form of larger-level expressions such as a standard server, a standard rack, a standard data center and the like, and when registering the information, the computing power chip information should be recorded simultaneously.
Step S102, the computing power providing reports computing power resources to a computing power trading platform.
S1021, the computing power provider i generates aPair key { PU i ,PR i (where PU) i Is a public key, PR i Is a private key, and the computing power provider applies for the digital certificate to the digital certificate authority
S1022, the digital certificate authority generates a digital certificate C { PU } i Issuing a digital certificate bookmark to an algorithm force provider;
s1023, the computing power provider i is computing power resource information INFO i Generating digital signature sig { PR } i ,INFO i The power provider sends the information to the power transaction platform, and the content of the message is as follows
INFO i |sig{PR i ,INFO i }|C{PU i }
The digital certificates in step S1021 and step S1022 are applied for, and generally one digital certificate has a longer validity period, so that the digital certificate does not need to be reapplied for each time of reporting of the computing resources.
Step S103, after the computing power transaction platform receives the computing power resource information of the computing power provider, the process of verifying the computing power information is as follows:
verification of computing power resource information can be divided into external verification and local verification.
Wherein the external authentication method comprises: the power transaction platform sends the power resource information to an external mechanism, and the external mechanism performs verification and returns a verification result.
Step 1, generating a pair of secret keys { PU } by a power transaction platform ex ,PR ex (where PU) ex Is a public key, PR ex Is a private key, and the computing power transaction platform applies for the digital certificate from the digital certificate authority center
Step 2, the digital certificate authority generates a digital certificate C { PU } ex Digital certificate bookmark is sent to the power transaction platform
Step 3, the power management mechanism generates a pair of keys { PU ] gov ,PR gov (where PU) gov Is a public key, PR gov Is a private key, and the authority management mechanism applies for the digital certificate from the digital certificate authority
Step 4, the digital certificate authority generates a digital certificate C { PU } gov Issuing digital certificate bookmarks to a power management mechanism
Step 5, the computing power provider i reports computing power resource information INFO i |sig{PR i ,INFO i }|C{PU i The power transaction platform confirms the authenticity of the digital certificate, and uses the public key PU of the power provider i The computing power resource information is checked, ensuring that the information comes from the computing power provider i and has not been tampered with.
Step 6, the power transaction platform submits the power resource information to a power management mechanism for inquiry, wherein the inquired content comprises a power provider ID, power resource information, a digital signature and a digital certificate
ID i |INFO i |sig{PR ex ,ID i |INFO i }|C{PU ex }
And step 7, the computing force management mechanism compares the queried computing force resources of the computing force transaction platform according to the computing force resource information backed up by the computing force provider, if the queried computing force resources can be matched with the backed up computing force resources, the computing force resources are confirmed to be true, otherwise, the computing force resources are false, the non-existing computing force resources are marked, the query result R is returned after summarization, and the private key is used for signing and sending to the computing force transaction platform.
R|sig{PR gov ,R}|C{PU gov }
The digital certificates applied in steps 1, 2, 3 and 4 generally have a relatively long validity period without reapplying the digital certificate for each inquiry.
The local verification method comprises the following steps: and the power transaction platform downloads all power resource information of the power management mechanism to the local in advance, and when the power provider reports the power resource information, the power transaction platform verifies according to the power resource information backed up locally.
Step 1, generating a pair of secret keys { PU } by a power transaction platform ex ,PR ex (where PU) ex Is a public key, PR ex Is a private key, and the computing power transaction platform applies for the digital certificate from the digital certificate authority center
Step 2, the digital certificate authority generates a digital certificate C { PU } ex Digital certificate bookmark is sent to the power transaction platform
Step 3, the power management mechanism generates a pair of keys { PU ] gov ,PR gov (where PU) gov Is a public key, PR gov Is a private key, and the authority management mechanism applies for the digital certificate from the digital certificate authority
Step 4, the digital certificate authority generates a digital certificate C { PU } gov Issuing digital certificate bookmarks to a power management mechanism
Step 5, the computing power provider i reports computing power resource information INFO i |sig{PR i ,INFO i }|C{PU i The power transaction platform confirms the authenticity of the digital certificate, and uses the public key PU of the power provider i The computing power resource information is checked, ensuring that the information comes from the computing power provider i and has not been tampered with.
Step 6, the power calculation transaction platform requests power calculation resource information, and the request message sent by the power calculation transaction platform is as follows
Request|sig{PR ex ,Request}|C{PU ex }
And 7, the power management mechanism sends the requested power resource information to the power transaction platform.
And 8, passively updating the power transaction information by the power transaction platform, and transmitting the changed content to the power transaction platform when the power resource information of the power management mechanism is changed.
Step 9, the computing power trading platform carries out computing power resource information INFO according to the locally stored computing power resource information i And verifying, if the computing power resource can be matched with the backup computing power resource, confirming that the computing power resource is true, otherwise, marking that the computing power resource is false, and marking that the computing power resource does not exist.
Step S104, the power transaction platform executes the verification result, if the power resource INFO i If true, the computing power resource merchant carries out transaction, otherwise, the computing power provider i is punished according to the quantity of false contents, and the punishment mode can be to reduce the credit score.
According to the computing power verification method provided by the embodiment of the invention, the computing power transaction platform receives the second computing power resource information sent by the computing power provider, wherein the second computing power resource information is sent by the computing power provider after the computing power provider sends the first computing power resource information to the computing power management mechanism to finish the recording of the computing power resource; according to the comparison result of the second computing power resource information and the first computing power resource information, the computing power verification is completed.
Example 2:
the embodiment provides a computing power verification method, which is applied to a computing power provider, as shown in fig. 2, and includes:
step S021: transmitting the first computing resource information to a computing management mechanism to finish computing resource record;
in this embodiment, the power provider needs to put its own power resource on the power transaction platform, the power management mechanism is a supervision mechanism for power resources, and the power provider can only purchase power resources and sell power resources on the power transaction platform after recording the power resources, and the power provider can record all power resource information of itself as first power resource information at the power management mechanism.
Step S022: and sending the second computing power resource information to a computing power transaction platform so that the computing power transaction platform can finish computing power verification according to a comparison result of the second computing power resource information and the first computing power resource information.
In this embodiment, the computing power provider may upload computing power resource information required to be sold on the computing power transaction platform as second computing power resource information, and when performing computing power verification, computing power resources in the second computing power resource information can all find corresponding information in the first computing power resource information.
Optionally, before the sending the second computing power resource information to the computing power transaction platform, the method further includes:
generating a first public key and a first private key;
generating a first digital certificate according to the first public key;
and generating a first digital signature according to the first private key.
Optionally, the sending the second computing power resource information to the computing power trading platform simultaneously or later further includes:
and sending the first digital certificate and the first digital signature to the power computing transaction platform, so that the power computing transaction platform verifies the first digital signature according to a first public key in the first digital certificate, and after verification is passed, comparing the second power computing resource information with the first power computing resource information to complete power computing verification.
In this embodiment, verification of the digital signature may ensure the authenticity of the source of the data and that the data has not been altered during transmission.
Example 3:
the present embodiment provides a method for verifying computing power, which is applied to a computing power management mechanism platform, as shown in fig. 3, and includes:
step S031: and receiving first computing power resource information sent by a computing power provider and completing computing power resource record so that the computing power transaction platform completes computing power verification according to a comparison result of the second computing power resource information and the first computing power resource information after receiving the second computing power resource information sent by the computing power provider.
In this embodiment, the power provider needs to put its own power resource on the power transaction platform, and the power management mechanism is a supervision mechanism for the power resource, and the power provider can only purchase the power resource and sell the power resource on the power transaction platform after recording the power resource.
Optionally, after receiving the first computing power resource information sent by the computing power provider and completing the computing power resource record, the method further includes:
sending the first recorded computing power resource information to the computing power transaction platform; or,
and receiving the second computing power resource information sent by the computing power trading platform, comparing the second computing power resource information with the first computing power resource information, and then sending a comparison result to the computing power trading platform.
Optionally, the receiving, simultaneously or after the second computing power resource information sent by the computing power trading platform further includes:
receiving a second digital certificate and a second digital signature sent by the computing power transaction platform, wherein the second digital signature is generated and sent according to a second private key and first computing power resource information after a second public key and a second private key are generated by a computing power provider, and the second digital signature is generated and sent according to a second public key after the second public key and the second private key are generated by the computing power provider;
Verifying the second digital signature according to a second public key in the second digital certificate;
and after the verification is passed, comparing the first computing power resource information with the second computing power resource information to finish computing power verification.
In this embodiment, verification of the digital signature may ensure the authenticity of the source of the data and that the data has not been altered during transmission.
Example 4:
the present embodiment provides a computing power verification device, which is disposed on a computing power transaction platform, as shown in fig. 4, and includes:
a first receiving module 11, configured to receive second computing power resource information sent by a computing power provider, where the second computing power resource information is sent by the computing power provider after sending the first computing power resource information to a computing power management mechanism to complete computing power resource filing;
the first verification module 12 is connected to the first receiving module 11, and is configured to complete computing power verification according to a comparison result between the second computing power resource information and the first computing power resource information.
Preferably, the first and second computing power resource information includes at least one of:
chip identification code ID, chip type, main frequency, memory, standard server information, standard rack information and standard data center information.
Preferably, the apparatus further comprises:
the first comparison module is used for comparing the second computing power resource information with the first computing power resource information to obtain the comparison result; or,
and sending the second computing power resource information to the computing power management mechanism, and receiving the comparison result sent after the computing power management mechanism compares the second computing power resource information with the first computing power resource information.
Preferably, the apparatus further comprises:
and the third receiving module is used for receiving the first recorded computing resource information sent by the computing management mechanism.
Preferably, the apparatus further comprises:
the fourth receiving module is used for receiving a first digital signature and a first digital certificate sent by the computing power provider, wherein the first digital signature is generated and sent according to the first private key and the second computing power resource information after the first public key and the first private key are generated by the computing power provider, and the first digital certificate is generated and sent according to the first public key after the first public key and the first private key are generated by the computing power provider;
the second verification module is used for verifying the first digital signature according to a first public key in the first digital certificate;
And the second comparison module is used for comparing the second computing power resource information with the first computing power resource information after the verification is passed so as to finish computing power verification.
Preferably, the apparatus further comprises:
the first generation module is used for generating a second public key and a second private key;
a second generation module for generating a second digital certificate according to the second public key;
and the third generation module is used for generating a second digital signature according to the second private key.
Preferably, the apparatus further comprises:
and the third sending module is used for sending the second digital signature and the second digital certificate to the power management mechanism so that the power management mechanism verifies the second digital signature according to a second public key in the second digital certificate and compares the second power resource information with the first power resource information after the second digital signature and the second digital certificate pass through the second public key so as to complete power verification.
Example 5:
the present embodiment provides a computing power verification device, which is disposed on a computing power provider, as shown in fig. 5, and includes:
a first sending module 21, configured to send the first computing resource information to a computing management mechanism to complete computing resource record;
the second sending module 22 is connected to the first sending module 21, and is configured to send second computing power resource information to the computing power transaction platform, so that the computing power transaction platform completes computing power verification according to a comparison result of the second computing power resource information and the first computing power resource information.
Preferably, the apparatus further comprises:
the fourth generation module is used for generating a first public key and a first private key;
a fifth generation module, configured to generate a first digital certificate according to the first public key;
and the sixth generation module is used for generating a first digital signature according to the first private key.
Preferably, the apparatus further comprises:
and the fourth sending module is used for sending the first digital certificate and the first digital signature to the computing power transaction platform so that the computing power transaction platform verifies the first digital signature according to a first public key in the first digital certificate and compares the second computing power resource information with the first digital signature after verification is passed to complete computing power verification.
Example 6:
the present embodiment provides a calculation force verification device, which is disposed in a calculation force management mechanism, as shown in fig. 6, and includes:
the second receiving module 31 is configured to receive the first computing power resource information sent by the computing power provider and complete computing power resource record, so that the computing power transaction platform completes computing power verification according to a comparison result of the second computing power resource information and the first computing power resource information after receiving the second computing power resource information sent by the computing power provider. Preferably, the apparatus further comprises:
The third comparison module is used for sending the first recorded computing power resource information to the computing power transaction platform; or,
and receiving the second computing power resource information sent by the computing power trading platform, comparing the second computing power resource information with the first computing power resource information, and then sending a comparison result to the computing power trading platform.
Preferably, the apparatus further comprises:
the fifth receiving module is used for receiving a second digital certificate and a second digital signature sent by the computing power transaction platform, wherein the second digital signature is generated and sent according to the second private key and the first computing power resource information after the second public key and the second private key are generated by the computing power provider, and the second digital certificate is generated and sent according to the second public key after the second public key and the second private key are generated by the computing power provider;
a third verification module, configured to verify the second digital signature according to a second public key in the second digital certificate;
and the fourth comparison module is used for comparing the first computing power resource information with the second computing power resource information after the verification is passed so as to finish computing power verification.
Example 7:
the present embodiment provides a computing power verification apparatus, as shown in fig. 7, comprising a memory 41 and a processor 42, the memory 41 storing a computer program, the processor 42 being arranged to run the computer program to implement the computing power verification method as described in embodiment 1, or to implement the computing power verification method as described in embodiment 2, or to implement the computing power verification method as described in embodiment 3.
Example 8:
the present embodiment provides a calculation force verification system, as shown in fig. 8, including a calculation force transaction platform 51, a calculation force provider 52, and a calculation force management mechanism 53;
the computing power trading platform is used for executing the computing power verification method described in the embodiment 1;
the computing force provider is configured to perform the computing force verification method described in embodiment 2;
the computing force management mechanism is configured to perform the computing force verification method described in embodiment 3.
The method, device and system for verifying the computing power provided in embodiments 2 to 6 receive, by a computing power transaction platform, second computing power resource information sent by a computing power provider, where the second computing power resource information is sent by the computing power provider after sending first computing power resource information to a computing power management mechanism to complete computing power resource recording; according to the comparison result of the second computing power resource information and the first computing power resource information, the computing power verification is completed.
It is to be understood that the above embodiments are merely illustrative of the application of the principles of the present invention, but not in limitation thereof. Various modifications and improvements may be made by those skilled in the art without departing from the spirit and substance of the invention, and are also considered to be within the scope of the invention.
Claims (18)
1. A method of computing power verification, for use with a computing power trading platform, the method comprising:
receiving second computing power resource information sent by a computing power provider, wherein the second computing power resource information is sent after the computing power provider sends first computing power resource information to a computing power management mechanism to finish computing power resource recording;
and completing computing power verification according to the comparison result of the second computing power resource information and the first computing power resource information.
2. The computing power verification method of claim 1, wherein the first computing power resource information and the second computing power resource information comprise at least one of:
chip identification code ID, chip type, main frequency, memory, standard server information, standard rack information and standard data center information.
3. The method according to claim 1, wherein before the completion of the calculation power according to the comparison result of the second calculation power resource information and the first calculation power resource information, the method further comprises:
comparing the second computing power resource information with the first computing power resource information to obtain a comparison result; or,
and sending the second computing power resource information to the computing power management mechanism, and receiving the comparison result sent after the computing power management mechanism compares the second computing power resource information with the first computing power resource information.
4. The method for verifying the computing power according to claim 3, wherein comparing the second computing power resource information with the first computing power resource information on record, before obtaining the comparison result, further comprises:
and receiving the first recorded computing resource information sent by the computing management mechanism.
5. The computing power verification method of claim 1, wherein the receiving the second computing power resource information sent by the computing power provider, simultaneously or later, further comprises:
receiving a first digital signature and a first digital certificate sent by a computing power provider, wherein the first digital signature is generated and sent according to a first private key and second computing power resource information after the first public key and the first private key are generated by the computing power provider, and the first digital certificate is generated and sent according to the first public key after the first public key and the first private key are generated by the computing power provider;
Verifying the first digital signature according to a first public key in the first digital certificate;
and after the verification is passed, comparing the second computing power resource information with the first computing power resource information to finish computing power verification.
6. The method of claim 3, wherein prior to sending the second computing resource information to the computing management mechanism, further comprising:
generating a second public key and a second private key;
generating a second digital certificate according to the second public key;
and generating a second digital signature according to the second private key.
7. The computing power validation method of claim 6, wherein the sending the second computing power resource information to the computing power management mechanism concurrently or thereafter further comprises:
and sending the second digital signature and the second digital certificate to a computing management mechanism so that the computing management mechanism verifies the second digital signature according to a second public key in the second digital certificate and compares the second computing resource information with the first computing resource information after the second digital signature and the second digital certificate pass through the second public key to complete computing verification.
8. A method of computing power verification, for use with a computing power provider, the method comprising:
Transmitting the first computing resource information to a computing management mechanism to finish computing resource record;
and sending the second computing power resource information to a computing power transaction platform so that the computing power transaction platform can finish computing power verification according to a comparison result of the second computing power resource information and the first computing power resource information.
9. The method of claim 8, wherein before sending the second computing power resource information to the computing power trading platform, further comprising:
generating a first public key and a first private key;
generating a first digital certificate according to the first public key;
and generating a first digital signature according to the first private key.
10. The method of claim 9, wherein the sending the second computing power resource information to the computing power trading platform simultaneously or subsequently further comprises:
and sending the first digital certificate and the first digital signature to the power computing transaction platform, so that the power computing transaction platform verifies the first digital signature according to a first public key in the first digital certificate, and after verification is passed, comparing the second power computing resource information with the first digital signature to complete power computing verification.
11. A method of verifying a computing force, for use in a computing force management institution, the method comprising:
and receiving first computing power resource information sent by a computing power provider and completing computing power resource record so that the computing power transaction platform completes computing power verification according to a comparison result of the second computing power resource information and the first computing power resource information after receiving the second computing power resource information sent by the computing power provider.
12. The method of claim 11, further comprising, after receiving the first computing power resource information sent by the computing power provider and completing the computing power resource proposal:
sending the first recorded computing power resource information to the computing power transaction platform; or,
and receiving the second computing power resource information sent by the computing power trading platform, comparing the second computing power resource information with the first computing power resource information, and then sending a comparison result to the computing power trading platform.
13. The method of claim 12, wherein the receiving the second computing power resource information sent by the computing power trading platform simultaneously or later further comprises:
receiving a second digital certificate and a second digital signature sent by the computing power transaction platform, wherein the second digital signature is generated and sent according to a second private key and first computing power resource information after a second public key and a second private key are generated by a computing power provider, and the second digital signature is generated and sent according to a second public key after the second public key and the second private key are generated by the computing power provider;
Verifying the second digital signature according to a second public key in the second digital certificate;
and after the verification is passed, comparing the first computing power resource information with the second computing power resource information to finish computing power verification.
14. A computing power verification device, characterized in that it is disposed on a computing power transaction platform, the device comprising:
the first receiving module is used for receiving second computing power resource information sent by a computing power provider, wherein the second computing power resource information is sent by the computing power provider after the first computing power resource information is sent to a computing power management mechanism to finish computing power resource recording;
and the first verification module is connected with the first receiving module and is used for completing calculation verification according to the comparison result of the second calculation resource information and the first calculation resource information.
15. A computing force verification device, disposed at a computing force provider, the device comprising:
the first sending module is used for sending the first computing power resource information to the computing power management mechanism so as to finish computing power resource record;
the second sending module is connected with the first sending module and is used for sending second computing power resource information to the computing power transaction platform so that the computing power transaction platform can complete computing power verification according to a comparison result of the second computing power resource information and the first computing power resource information.
16. A computing force verification device, characterized in that it is provided in a computing force management mechanism, the device comprising:
the second receiving module is used for receiving the first computing power resource information sent by the computing power provider and finishing computing power resource record, so that the computing power transaction platform finishes computing power verification according to the comparison result of the second computing power resource information and the first computing power resource information after receiving the second computing power resource information sent by the computing power provider.
17. A computing power verification device comprising a memory and a processor, the memory having stored therein a computer program, the processor being arranged to run the computer program to implement the computing power verification method of any one of claims 1-7, or to implement the computing power verification method of claims 8-10, or to implement the computing power verification method of claims 11-13.
18. The calculation force verification system is characterized by comprising a calculation force transaction platform, a calculation force provider and a calculation force management mechanism;
the computing power trading platform is used for executing the computing power verification method of any one of claims 1-7;
the computing power provider for performing the computing power verification method of any one of claims 8-10;
The computing management mechanism is for performing the computing verification method of any one of claims 11-13.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211664166.4A CN116028985A (en) | 2022-12-23 | 2022-12-23 | Calculation force verification method, device and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211664166.4A CN116028985A (en) | 2022-12-23 | 2022-12-23 | Calculation force verification method, device and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116028985A true CN116028985A (en) | 2023-04-28 |
Family
ID=86069926
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211664166.4A Pending CN116028985A (en) | 2022-12-23 | 2022-12-23 | Calculation force verification method, device and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116028985A (en) |
-
2022
- 2022-12-23 CN CN202211664166.4A patent/CN116028985A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109815657B (en) | Identity authentication method and device based on alliance chain, computer readable storage medium and terminal equipment | |
CA3030813C (en) | Method for providing smart contract-based certificate service, and server employing same | |
CN108111314B (en) | Method and equipment for generating and verifying digital certificate | |
CN109040029B (en) | Method and apparatus for executing transactions in a blockchain | |
CN110383752B (en) | Compact recording protocol | |
CN113472720B (en) | Digital certificate key processing method, device, terminal equipment and storage medium | |
CN110247884B (en) | Method, device and system for updating certificate and computer readable storage medium | |
EP3413251A1 (en) | Method and server for providing notary service for file and verifying file recorded by notary service | |
CN108769010B (en) | Method and device for node invited registration | |
CN111385103B (en) | Authority processing method, system and device and electronic equipment | |
CN112953978B (en) | Multi-signature authentication method, device, equipment and medium | |
Abbade et al. | Blockchain applied to vehicular odometers | |
CN112734431B (en) | Method and device for querying Fabric Block Link book data | |
CN109447636A (en) | A kind of assets transfer method and device | |
CN110942302A (en) | Block chain certificate revocation and verification method, issuing node and verification node | |
CN112165382A (en) | Software authorization method and device, authorization server and terminal equipment | |
CN111967061B (en) | Block chain-based trusted account transfer transaction method and device | |
CN111314172A (en) | Data processing method, device and equipment based on block chain and storage medium | |
CN112115425A (en) | Software authorization permission method and device and electronic equipment | |
CN113743921A (en) | Digital asset processing method, device, equipment and storage medium | |
CN111125778A (en) | Copyright transaction information processing method and device | |
CN112311779A (en) | Data access control method and device applied to block chain system | |
CN114092092B (en) | Decentralized digital certificate management system based on threshold signature and use method | |
CN114117551B (en) | Access verification method and device | |
CN111050326B (en) | Block chain-based short message verification method, device, equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |