CN112270603B - Decentralized node certificate management method and system - Google Patents

Decentralized node certificate management method and system Download PDF

Info

Publication number
CN112270603B
CN112270603B CN202011531532.XA CN202011531532A CN112270603B CN 112270603 B CN112270603 B CN 112270603B CN 202011531532 A CN202011531532 A CN 202011531532A CN 112270603 B CN112270603 B CN 112270603B
Authority
CN
China
Prior art keywords
node
nodes
certificate
sending
transaction request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011531532.XA
Other languages
Chinese (zh)
Other versions
CN112270603A (en
Inventor
石宁
许小明
甘子荣
李达
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Trusted Blockchain And Algorithm Economics Research Institute Co ltd
Original Assignee
Nanjing Trusted Blockchain And Algorithm Economics Research Institute Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Trusted Blockchain And Algorithm Economics Research Institute Co ltd filed Critical Nanjing Trusted Blockchain And Algorithm Economics Research Institute Co ltd
Priority to CN202011531532.XA priority Critical patent/CN112270603B/en
Publication of CN112270603A publication Critical patent/CN112270603A/en
Application granted granted Critical
Publication of CN112270603B publication Critical patent/CN112270603B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Databases & Information Systems (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Development Economics (AREA)
  • Data Mining & Analysis (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a decentralized node certificate management method and a decentralized node certificate management system, which comprise that a sending node sends a transaction request for executing a first certificate operation on a first node to other nodes except the sending node in a alliance chain; the other nodes verify the transaction request; a sending node acquires feedback information sent by other nodes; the sending node obtains a consensus result according to the feedback information sent by all other nodes; if the consensus result is successful, the sending node executes a first certificate operation on the first node and simultaneously sends the consensus result to all other nodes; all other nodes execute the transaction according to the consensus result. According to the certificate management method and system, certificate management of a trust mechanism is achieved through a block chain technology, a consensus record is formed in a transaction mode, various operations on the certificate are completed on a block, decentralized certificate management is achieved, operation efficiency is improved, and potential safety hazards and complexity of using a third party authority are reduced.

Description

Decentralized node certificate management method and system
Technical Field
The present invention relates to the field of block chain technologies, and in particular, to a decentralized node certificate management method and system.
Background
The federation chain is composed of a plurality of nodes, when information interaction between the nodes is carried out, the identity certificates of the nodes need to be verified, and the information interaction can be carried out only after the verification is passed.
In the prior art, identity certificates of each node are usually generated by a third party authority and manually bound to the node, and management of the certificates is also completed by the third party authority. The main contents of the certificate include a certificate serial number, a certificate validity period, a public key of a certificate owner, and the like.
However, the method still corresponds to a management method for deploying operation and maintenance by a centralized server, the security of the certificate depends on the security of a third party authority, once the authority is maliciously broken or the authority itself subjectively wants to imitate users, information leakage or identity misuse can be easily caused, and the information security is not high; in addition, the issued integers are time-efficient, and after the issued integers are expired, new certificates need to be issued again, and when the node certificates are frozen, revoked and the like by the federation chain, the certificates need to be issued again, which greatly increases the operation difficulty and the operation cost.
Disclosure of Invention
The application provides a decentralized node certificate management method and system, and aims to solve the problems of low centralized trust, poor safety and complex operation in the prior art when each node certificate is managed.
In a first aspect, the present application provides a decentralized node certificate management method, including:
the sending node sends the transaction request for executing the first certificate operation on the first node to other nodes except the sending node in the alliance chain; the transaction request comprises a signature of the first node;
the other nodes verify the transaction request;
a sending node acquires feedback information sent by other nodes;
the sending node obtains a consensus result according to the feedback information sent by all other nodes;
if the consensus result is successful, the sending node executes a first certificate operation on the first node and simultaneously sends the consensus result to all other nodes;
all other nodes execute the transaction according to the consensus result.
In some embodiments, the sending node is a first node, the method further comprising:
a sending node locally generates a transaction request for executing a first certificate operation;
signing the transaction request;
wherein the step of the sending node performing the first certificate operation on the first node comprises: the sending node performs the first certificate operation locally.
In some embodiments, the sending node is a node other than the first node in the federation chain; the method further comprises the following steps:
a sending node generates a transaction request for executing a first certificate operation;
a sending node generates a signature request and sends the signature request to a first node; the signature request comprises the transaction request;
the first node signs the transaction request according to the signature request to obtain the transaction request containing the signature of the first node;
the first node sends a transaction request containing a first node signature to a sending node;
wherein the step of the sending node performing the first certificate operation on the first node comprises:
a sending node sends a control instruction for executing a first certificate operation to a first node;
and the first node executes the first certificate operation according to the control instruction.
In some embodiments, the step of the sending node obtaining the consensus result according to the feedback information sent by all other nodes includes:
counting the number of nodes agreeing to execute the transaction in the feedback information sent by all other nodes;
if the number of the nodes is larger than or equal to a preset threshold value, obtaining a successful consensus result;
and if the number of the nodes is smaller than a preset threshold value, obtaining a consensus result of consensus failure.
In some embodiments, the first certificate operation comprises one of certificate freeze, certificate unfreeze, certificate revoke, certificate replace.
In some embodiments, the feedback information sent by the other node includes node state information; the step that the sending node obtains the consensus result according to the feedback information sent by all other nodes comprises the following steps:
taking a node with abnormal node state information in all other nodes as an abnormal node, and obtaining a consensus result by the sending node according to feedback information sent by other nodes after the abnormal node is removed; the abnormal node state information comprises certificate freezing or certificate revoking.
In a second aspect, the present application further provides a system applying the method of the first aspect.
The method provided by the application has the following beneficial effects:
in the scheme of the application, the management process of the certificate is uploaded to the block chain data in a transaction mode, and the integrity of the recorded data in the whole process can be guaranteed.
In the scheme of the application, the cluster nodes are ensured to have uniform node credibility through a cluster consensus algorithm.
The certificate is commonly identified and recorded on the block in a transaction mode, so that various operations on the certificate are completed, decentralized management is realized, the operation efficiency is improved, and the potential safety hazard and complexity of using a third party authority are reduced.
Drawings
In order to more clearly explain the technical solution of the present application, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious to those skilled in the art that other drawings can be obtained according to the drawings without any creative effort.
Fig. 1 is a flowchart of a decentralized node certificate management method according to the present application;
FIG. 2 is an exploded step diagram of step S400 of the method of FIG. 1;
FIG. 3 is a flow diagram of the method of FIG. 1 in one embodiment;
FIG. 4 is a flow chart of the method of FIG. 1 in another embodiment.
Detailed Description
The block chain has the characteristics of decentralization, traceability, tamper resistance, anonymity and the like, and the right of data can be confirmed to a certain extent through the block chain technology, so that the safety of the data is further ensured. The present application aims to provide a method for managing a node certificate in a blockchain/federation chain, which improves the security and flexibility of node certificate management, and the method of the present application is described in detail below:
referring to fig. 1, a flowchart of a decentralized node certificate management method provided in the present application is shown;
as can be seen from fig. 1, the method provided by the present application includes:
s100: the sending node sends the transaction request for executing the first certificate operation on the first node to other nodes except the sending node in the alliance chain; the transaction request comprises a signature of the first node;
in this embodiment, any node in the federation chain may be used as a sending node to perform the operation of step S100, where the first node refers to a node on which an operation is to be performed; the first certificate operation may include various operations, such as certificate freeze, certificate unfreeze, certificate revoke, certificate replace, or others, and the present embodiment is explained by taking certificate freeze as an example, and it should be understood that the method steps for performing other first certificate operations are the same as or similar to them. For example, if four nodes a/B/C/D are provided in the federation chain, the operation of step S100 may be performed by any one of the four nodes a/B/C/D if a certificate request for the a node is desired to freeze, and the B/C/D may be the other node assuming a is the sending node.
The sent transaction request contains the signature of the first node, the request is proved to be permitted by the first node, the authenticity of the request can be judged through the verification of the signature, and the malicious operation of the node is prevented.
S200: the other nodes verify the transaction request;
the verification of the transaction request includes verifying the identity of the sender (sending node) and verifying the identity of the operated party (first node), so that the transaction request at least includes information identifying the two identities, and after receiving the transaction request, other nodes extract the information in the request for verification, such as whether the sender qualifies as a request, whether the operated party is in a state of being operable, and so on. If the transaction request is not verified, feedback information such as the transaction request is not accepted can be directly generated.
S300: a sending node acquires feedback information sent by other nodes; the feedback information may include, in addition to information on whether the transaction request is received, reasons for non-acceptance, and the like, and the feedback information also includes identity information of a node that sends the information, which is used to provide an authenticity verification basis for the corresponding feedback information and a data record for a verification process.
S400: the sending node obtains a consensus result according to the feedback information sent by all other nodes;
in this embodiment, the consensus result obtained in step S400 includes two types, i.e., success of consensus and failure of consensus, and when the number of nodes satisfying the requirement of the consensus rule in the federation chain select to receive the transaction request, it indicates that the transaction is successfully agreed and is to be executed by all nodes, otherwise, it indicates that the transaction is not successfully agreed and is not executed by all nodes.
Further, the consensus rule may be implemented by setting a preset threshold (the number of nodes meeting the consensus criterion), where the preset threshold may be a specific value, for example, in a federation chain formed by 100 nodes, and the preset threshold of 60 indicates that successful consensus occurs when 60 nodes agree with the transaction request; the preset threshold may also be a percentage, e.g. 80%, i.e. successful consensus only when 80% of all nodes agree to the transaction request. Accordingly, taking the preset threshold as a specific value as an example, as shown in fig. 2, step S400 is decomposed into:
s410: counting the number of nodes agreeing to execute the transaction in the feedback information sent by all other nodes; whether the other nodes agree to execute the transaction is selected by themselves after the transaction request is verified, if the other nodes agree, the feedback information contains the information of agreeing to execute the transaction, and if the other nodes disagree, the feedback information contains the information of disagreeing to execute the transaction.
S420: if the number of the nodes is larger than or equal to a preset threshold value, obtaining a successful consensus result;
s430: and if the number of the nodes is smaller than a preset threshold value, obtaining a consensus result of consensus failure.
If the consensus result is successful, executing S500: the sending node performs the first certificate operation on the first node, and for example, the performed operation is freezing, and at this time, the certificate of the first node needs to be frozen.
While the freezing of the first node is performed, S600 needs to be performed: sending the consensus result to all other nodes; all other nodes herein refer to all nodes that send feedback information, including nodes that agree to perform a transaction and nodes that disagree with performing a transaction.
S700: and all other nodes execute transaction according to the consensus result, and the information data synchronization of each node on the alliance chain is ensured.
According to the technical scheme, the decentralized node certificate management method comprises the steps that a sending node sends a transaction request for executing first certificate operation on a first node to other nodes except the sending node in a alliance chain; the other nodes verify the transaction request; a sending node acquires feedback information sent by other nodes; the sending node obtains a consensus result according to the feedback information sent by all other nodes; if the consensus result is successful, the sending node executes a first certificate operation on the first node and simultaneously sends the consensus result to all other nodes; all other nodes execute the transaction according to the consensus result. According to the method and the system, the certificate management of the trust mechanism is realized through the blockchain technology, the consensus records are formed in a transaction mode and are completed on the blocks to complete various operations (such as freezing, revoking and the like) on the certificate, decentralized certificate management is realized, the operation efficiency is improved, and the potential safety hazard and complexity of using a third party authority are reduced.
Further, since in the present application, the node serving as the sending node may be the first node itself, that is, node a sends the transaction request for the first certificate operation of the node a certificate, or may be any other node in the federation chain, that is, node B sends the transaction request for the first certificate operation of the node a certificate, when the sending node is a different subject, the method of the present application is evolved from two embodiments:
in a first feasible embodiment, as shown in fig. 3, in this case, the sending node is the first node itself, and the method further includes:
s80: a sending node locally generates a transaction request for executing a first certificate operation;
s90: signing the transaction request;
steps S80 and S90 are the process of generating the transaction request, both the transaction request and the signature are generated locally since the sending node is the first node itself.
In this embodiment, step S500 is actually performed directly by the sending node locally to perform the first certificate operation (e.g., freezing).
Other steps in this embodiment are the same as those in the above embodiment, and are not described herein again.
In a second feasible embodiment, as shown in fig. 4, the sending node at this time is a node other than the first node in the federation chain; the method further comprises the following steps:
s40: a sending node generates a transaction request for executing a first certificate operation;
s50: the sending node generates a signature request and sends the signature request to the first node to request the first node to sign the transaction request; the signature request comprises the transaction request;
s60: the first node signs the transaction request according to the signature request to obtain the transaction request containing the signature of the first node;
s70: the first node sends a transaction request containing the first node signature to the sending node, the transaction request at this time being the transaction request to be sent in step S100.
Accordingly, when step S500 is executed, step S500 is decomposed into:
s510: a sending node sends a control instruction for executing a first certificate operation to a first node;
s520: and the first node executes the first certificate operation according to the control instruction.
Other steps in this embodiment are the same as those in the above embodiment, and are not described herein again.
After the method provided by the present application is executed according to any of the above embodiments, if the first certificate operation is freezing or revoking, all nodes agree with the freezing or revoking operation of the first node a, and the node a that has executed the certificate freezing or revoking operation cannot participate in other subsequent agreement processes until the freezing is recovered or the certificate is obtained again. That is to say, when obtaining the consensus result, it needs to consider whether there is a frozen node or a revoked node in all other nodes, and information fed back by these nodes cannot be used as a reference for the consensus result, so in any of the above embodiments, the feedback information sent by the other nodes includes node state information; step S300 further includes:
taking a node with abnormal node state information in all other nodes as an abnormal node, and obtaining a consensus result by the sending node according to feedback information sent by other nodes after the abnormal node is removed; the abnormal node state information comprises certificate freezing or certificate revoking. Therefore, the influence of the abnormal node on the consensus result is avoided, the consensus is more accurate, and the credibility is higher.
It should be noted that, in the foregoing embodiment, the certificate freezing is only used as an example for description, and the method provided in this embodiment may be applied to certificate revocation, certificate replacement, and certificate unfreezing.
Corresponding to the method, the application also provides a decentralized node certificate management system applying the method, which comprises a federation chain formed by a sending node and a plurality of other nodes, wherein,
the sending node is configured to send a transaction request for performing a first certificate operation on the first node to other nodes in the federation chain except the sending node; the transaction request comprises a signature of the first node; acquiring feedback information sent by other nodes; obtaining a consensus result according to the feedback information sent by all other nodes; if the consensus result is successful, executing a first certificate operation on the first node, and simultaneously sending the consensus result to all other nodes;
the other node is configured to verify the transaction request; and is further configured to execute a transaction based on the consensus result.
Further, the sending node is a first node, and the sending node is further configured to:
locally generating a transaction request to perform a first credential operation; signing the transaction request;
wherein, in performing the first certificate operation on the first node, the sending node is further configured to perform the first certificate operation locally.
Further, the sending node is other nodes except the first node in the alliance chain; the transmitting node is further configured to:
generating a transaction request to perform a first certificate operation;
generating a signature request and sending the signature request to a first node; the signature request comprises the transaction request;
the first node is configured to: signing the transaction request according to the signature request to obtain the transaction request containing the first node signature; sending a transaction request containing a first node signature to a sending node; and executing a first certificate operation according to the control instruction.
Wherein, when the first certificate operation of the first node is executed, the sending node is further configured to send a control instruction for executing the first certificate operation to the first node.
Further, the feedback information sent by the other nodes includes node state information; the transmitting node is further configured to:
taking the node with abnormal node state information in all other nodes as an abnormal node, and obtaining a consensus result according to feedback information sent by other nodes after the abnormal node is removed; the abnormal node state information comprises certificate freezing or certificate revoking.
The functions of the system of the present application are described in the above method embodiments, and are not described herein again.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.

Claims (5)

1. A decentralized node certificate management method, characterized in that it comprises:
the sending node sends the transaction request for executing the first certificate operation on the first node to other nodes except the sending node in the alliance chain; the transaction request comprises a signature of the first node; the sending node is a first node or other nodes except the first node in the alliance chain; the first certificate operation comprises one of certificate freezing, certificate unfreezing, certificate revoking and certificate replacing;
the other nodes verify the transaction request;
a sending node acquires feedback information sent by other nodes;
the sending node obtains a consensus result according to the feedback information sent by all other nodes;
if the consensus result is successful, the sending node executes a first certificate operation on the first node and simultaneously sends the consensus result to all other nodes;
all other nodes execute the transaction according to the consensus result;
wherein, the feedback information sent by other nodes comprises node state information; the step that the sending node obtains the consensus result according to the feedback information sent by all other nodes comprises the following steps:
taking a node with abnormal node state information in all other nodes as an abnormal node, and obtaining a consensus result by the sending node according to feedback information sent by other nodes after the abnormal node is removed; the abnormal node state information comprises certificate freezing or certificate revoking;
when the sending node is other nodes except the first node in the alliance chain; the method further comprises the following steps:
a sending node generates a transaction request for executing a first certificate operation;
a sending node generates a signature request and sends the signature request to a first node; the signature request comprises the transaction request;
the first node signs the transaction request according to the signature request to obtain the transaction request containing the signature of the first node;
the first node sends a transaction request containing a first node signature to a sending node;
wherein the step of the sending node performing the first certificate operation on the first node comprises:
a sending node sends a control instruction for executing a first certificate operation to a first node;
and the first node executes the first certificate operation according to the control instruction.
2. The method of claim 1, wherein the sending node is a first node, the method further comprising:
a sending node locally generates a transaction request for executing a first certificate operation;
signing the transaction request;
wherein the step of the sending node performing the first certificate operation on the first node comprises: the sending node performs the first certificate operation locally.
3. The method according to claim 1 or 2, wherein the step of the sending node obtaining the consensus result according to the feedback information sent by all other nodes comprises:
counting the number of nodes agreeing to execute the transaction in the feedback information sent by all other nodes;
if the number of the nodes is larger than or equal to a preset threshold value, obtaining a successful consensus result;
and if the number of the nodes is smaller than a preset threshold value, obtaining a consensus result of consensus failure.
4. A decentralized node certificate management system, characterized in that the system comprises a federation chain formed by a sending node and a plurality of other nodes, wherein the sending node is a first node or other nodes except the first node in the federation chain;
the sending node is configured to send a transaction request for performing a first certificate operation on the first node to other nodes in the federation chain except the sending node; the first certificate operation comprises one of certificate freezing, certificate unfreezing, certificate revoking and certificate replacing; the transaction request comprises a signature of the first node; acquiring feedback information sent by other nodes; obtaining a consensus result according to the feedback information sent by all other nodes; if the consensus result is successful, executing a first certificate operation on the first node, and simultaneously sending the consensus result to all other nodes;
the other node is configured to verify the transaction request; further configured to perform a transaction according to the consensus result;
wherein, the feedback information sent by other nodes comprises node state information; the transmitting node is further configured to:
taking the node with abnormal node state information in all other nodes as an abnormal node, and obtaining a consensus result according to feedback information sent by other nodes after the abnormal node is removed; the abnormal node state information comprises certificate freezing or certificate revoking;
when the sending node is other nodes except the first node in the alliance chain; the transmitting node is further configured to:
generating a transaction request to perform a first certificate operation;
generating a signature request and sending the signature request to a first node; the signature request comprises the transaction request;
the first node is configured to: signing the transaction request according to the signature request to obtain the transaction request containing the first node signature; sending a transaction request containing a first node signature to a sending node; executing a first certificate operation according to the control instruction;
wherein, when the first certificate operation of the first node is executed, the sending node is further configured to send a control instruction for executing the first certificate operation to the first node.
5. The system of claim 4, wherein the sending node is a first node, the sending node further configured to:
locally generating a transaction request to perform a first credential operation; signing the transaction request;
wherein, in performing the first certificate operation on the first node, the sending node is further configured to perform the first certificate operation locally.
CN202011531532.XA 2020-12-23 2020-12-23 Decentralized node certificate management method and system Active CN112270603B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011531532.XA CN112270603B (en) 2020-12-23 2020-12-23 Decentralized node certificate management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011531532.XA CN112270603B (en) 2020-12-23 2020-12-23 Decentralized node certificate management method and system

Publications (2)

Publication Number Publication Date
CN112270603A CN112270603A (en) 2021-01-26
CN112270603B true CN112270603B (en) 2021-04-06

Family

ID=74350198

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011531532.XA Active CN112270603B (en) 2020-12-23 2020-12-23 Decentralized node certificate management method and system

Country Status (1)

Country Link
CN (1) CN112270603B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110061851A (en) * 2019-04-28 2019-07-26 广州大学 A kind of across trust domain authentication method and system of decentralization
CN111131318A (en) * 2019-12-31 2020-05-08 南京金宁汇科技有限公司 Decentralized key management and distribution method, system and storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107508680B (en) * 2017-07-26 2021-02-05 创新先进技术有限公司 Digital certificate management method and device and electronic equipment
CN107360001B (en) * 2017-07-26 2021-12-14 创新先进技术有限公司 Digital certificate management method, device and system
CN108052530B (en) * 2017-11-10 2020-12-11 杭州云象网络技术有限公司 Decentralized CA construction method and system based on alliance chain
CN111737766B (en) * 2020-08-03 2020-12-04 南京金宁汇科技有限公司 Method for judging validity of digital certificate signature data in block chain

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110061851A (en) * 2019-04-28 2019-07-26 广州大学 A kind of across trust domain authentication method and system of decentralization
CN111131318A (en) * 2019-12-31 2020-05-08 南京金宁汇科技有限公司 Decentralized key management and distribution method, system and storage medium

Also Published As

Publication number Publication date
CN112270603A (en) 2021-01-26

Similar Documents

Publication Publication Date Title
CN109002732B (en) Data evidence storage method, equipment and system and data evidence obtaining method
CN109474584B (en) Rule-based block chain network automatic permission joining method
CN112311735B (en) Credible authentication method, network equipment, system and storage medium
CN111262692B (en) Key distribution system and method based on block chain
CN108921694B (en) Block chain management method, block chain node and computer readable storage medium
CN113328997B (en) Alliance chain crossing system and method
CN113824563B (en) Cross-domain identity authentication method based on block chain certificate
CN112187455A (en) Method for constructing distributed public key infrastructure based on editable block chain
CN110855445B (en) Block chain-based certificate management method and device and storage equipment
CN112069550B (en) Electronic contract evidence-storing system based on intelligent contract mode
CN112396421B (en) Identity authentication system and method based on blockchain pass
CN106886722A (en) Big data information processing method and device
CN113950801A (en) Method and apparatus for public key management using blockchains
CN114760071B (en) Zero-knowledge proof based cross-domain digital certificate management method, system and medium
CN112035896A (en) Electronic contract deposit certificate system based on transaction mode
CN115174570A (en) Cross-chain consensus method and system based on dynamic committee
CN110493002B (en) Method, device and system for renewing certificate
CN111177766A (en) Block chain management system and management method applied to pipeline integrity management
CN112910661B (en) Block chain consensus method, device, equipment and medium suitable for electronic subscription
CN107872421B (en) Node authentication method and system and related equipment
CN112270603B (en) Decentralized node certificate management method and system
CN112182009A (en) Data updating method and device of block chain and readable storage medium
CN114978553B (en) Alliance chain cipher algorithm switching method, device and alliance chain system
CN116828451A (en) Block chain-based network connection motorcade identity authentication method, device and medium
CN114092092B (en) Decentralized digital certificate management system based on threshold signature and use method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant