Search

WO-2026091085-A1 - DISTRIBUTED DATA SIGNATURE AND VERIFICATION METHOD AND APPARATUS

WO2026091085A1WO 2026091085 A1WO2026091085 A1WO 2026091085A1WO-2026091085-A1

Abstract

Disclosed in the present invention are a distributed data signature and verification method and apparatus. The method comprises: segmenting a numerical value of a digital signature into N segments of numerical values, wherein the digital signature belongs to CA authentication; numbering cloud servers which execute the CA authentication, and segmenting each number into M segments of numerical values; and matching at least one segment of numerical values among the N segments of numerical values of the digital signature with the M segments of numerical values of each number, and if the matching is successful, selecting the cloud server corresponding to the successfully matched number to verify the digital signature, wherein both N and M are greater than 1. In the present invention, on the basis of existing facilities, the computing power of a plurality of dispersed authentication centers are used to simultaneously participate in signature and verification, thereby achieving the effect of distributed parallel processing, enabling the computing power of cloud services to be fully exerted, and also ensuring a higher efficiency, a higher speed and a shorter time for signature operations and signature verification.

Inventors

  • ZHANG, Dechuang
  • ZHANG, Shidu

Assignees

  • 威艾特科技(深圳)有限公司

Dates

Publication Date
20260507
Application Date
20241101

Claims (10)

  1. A distributed data signature verification method, characterized in that it includes: The digital signature is segmented into N segments, and the digital signature is subject to CA authentication. Assign a number to the cloud server performing CA authentication, and then segment the number into M segments of values; At least one segment of the N segments of the digital signature is matched with the M segments of the number. If a match is successful, the cloud server corresponding to the successfully matched number is selected to verify the digital signature; where N and M are both greater than 1.
  2. According to claim 1, the distributed data signature verification method is characterized in that the numerical segmentation of the digital signature into N segments includes: The digital signature value is hashed to obtain H_SIGN, which increases the randomness and discreteness of the digital signature value.
  3. According to claim 2, the distributed data signature verification method is characterized in that the numerical segmentation of the digital signature into N segments includes: The H_SIGN is divided into four segments, each containing four bytes.
  4. The distributed data signature verification method according to claim 1, characterized in that, the step of numbering the cloud server performing CA authentication and segmenting the number into M segments of values includes: The cloud servers are numbered according to their geographical location, and the number is divided into four segments: the first segment represents the province, the second segment represents the city, the third segment represents the district, and the fourth segment represents the IP address of the cloud server.
  5. According to claim 4, the distributed data signature verification method is characterized in that each of the N segments contains a four-byte value range, and the number range of the province with the cloud server is respectively mapped to the range of the four-byte value; the number range of the city corresponding to the province is mapped to the range of the four-byte value; and the number range of the area corresponding to the city is mapped to the range of the four-byte value.
  6. According to claim 4, the distributed data signature verification method is characterized in that the province number contains eight, and the four-byte value corresponding to 0 to 4294967295 is divided into eight segments, each segment corresponding to a number.
  7. The distributed data signature verification method according to claim 1 is characterized in that it further includes storing feature values corresponding to the digital signature, and storing the feature values in the corresponding cloud server according to the matching result of at least one segment of the N segments of the digital signature and the M segments of the number.
  8. A distributed data signature verification device, characterized in that it comprises: The first segmentation processing module is used to segment the digital signature into N segments, wherein the digital signature is a CA authentication. The second segmentation processing module is used to assign a number to the cloud server performing CA authentication and process the number into M segments of values. The verification module is used to match at least one segment of the N segments of the digital signature with the M segments of the number. If the match is successful, the cloud server corresponding to the successfully matched number is selected to verify the digital signature; where N and M are both greater than 1.
  9. An electronic device, characterized in that it comprises: At least one processor; and at least one memory communicatively connected to the processor, wherein: the memory stores program instructions executable by the processor, and the processor invokes the program instructions to execute the distributed data signature verification method as described in any one of claims 1 to 7.
  10. A computer-readable storage medium, characterized in that it stores a computer program thereon, which, when executed by a computer, performs the distributed data signature verification method as described in any one of claims 1 to 7.

Description

A distributed data signature verification method and apparatus Technical Field This invention relates to the field of data processing, and in particular to a distributed data signature verification method and apparatus. Background Technology In the era of big data, cloud services are the foundation of big data. Various types of data are generated, transmitted, and stored on the network. Therefore, the authenticity of all this data needs to be verified and validated, requiring efficient methods and technologies to achieve the best results in data applications. For example, in facial recognition applications, how can we quickly retrieve corresponding information from the database based on the collected facial features? Because the data volume is large and multiple verifications and calculations are required, many servers are needed to participate in the big data signature operation to store more data. Attached Figure Description Figure 1 is a flowchart illustrating a distributed data signature verification method according to an embodiment of the present invention; Figure 2 is a flowchart illustrating another distributed data signature verification method in an embodiment of the present invention; Figure 3 is a flowchart illustrating another distributed data signature verification method in an embodiment of the present invention; Figure 4 is a schematic diagram of a distributed data signature verification device according to an embodiment of the present invention. Detailed Implementation The technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings. Obviously, the described embodiments are only some embodiments of the present invention, and not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative effort are within the scope of protection of the present invention. It should be noted that, in this document, relational terms such as "first" and "second" are used merely to distinguish one entity or operation from another, and do not necessarily require or imply any such actual relationship or order between these entities or operations. Furthermore, the terms "comprising," "including," or any other variations thereof are intended to cover non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements includes not only those elements but also other elements not expressly listed, or elements inherent to such a process, method, article, or apparatus. Without further limitations, an element defined by the phrase "comprising one..." does not exclude the presence of other identical elements in the process, method, article, or apparatus that includes said element. A digital signature (also known as a public-key digital signature) is a unique string of numbers that only the sender of the information can generate and that cannot be forged by others. This string also serves as valid proof of the authenticity of the information sent by the sender. It is similar to a physical signature written on paper, but implemented using public-key cryptography techniques, and is used to authenticate digital information. A digital signature typically defines two complementary operations: one for signing and the other for verification. Digital signatures are an application of asymmetric key encryption and digital digest techniques. When sending a message, the sender uses a hash function to generate a message digest from the message text, and then encrypts this digest with the sender's private key. This encrypted digest is sent to the receiver along with the message as the message's digital signature. The receiver first calculates the message digest from the received original message using the same hash function as the sender, and then uses the public key to decrypt the digital signature attached to the message. If the two digests are the same, the receiver can confirm that the message belongs to the sender. This invention, building upon existing infrastructure, utilizes the computing power of multiple distributed authentication centers to simultaneously participate in signing and verification, achieving distributed parallel processing and fully leveraging the computing power of cloud services. In this invention, feature information is hierarchically structured at multiple levels. This hierarchical approach identifies the corresponding storage server, where verification and querying are then performed. This different hierarchical information allows for the distribution of facial feature information, and the high degree of randomness in this distribution prevents the results from clustering, thereby improving efficiency. Please refer to Figure 1. This invention provides a distributed data signature verification method, including: Step 110: Divide the digital signature into N segments (N is greater than 1), and