Movatterモバイル変換


[0]ホーム

URL:


CN110149322A - A kind of block chain encryption method that irreversible dynamic failure re-examination is rebuild - Google Patents

A kind of block chain encryption method that irreversible dynamic failure re-examination is rebuild
Download PDF

Info

Publication number
CN110149322A
CN110149322ACN201910372173.9ACN201910372173ACN110149322ACN 110149322 ACN110149322 ACN 110149322ACN 201910372173 ACN201910372173 ACN 201910372173ACN 110149322 ACN110149322 ACN 110149322A
Authority
CN
China
Prior art keywords
node
block chain
key
transaction
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910372173.9A
Other languages
Chinese (zh)
Inventor
李宝次
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Li Baoci
Shandong Gongchain Information Technology Co Ltd
Original Assignee
Shandong Gongchain Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Gongchain Information Technology Co LtdfiledCriticalShandong Gongchain Information Technology Co Ltd
Priority to CN201910372173.9ApriorityCriticalpatent/CN110149322A/en
Publication of CN110149322ApublicationCriticalpatent/CN110149322A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The block chain encryption method that a kind of irreversible dynamic failure re-examination according to the present invention is rebuild retrieves cryptographic block by peer node to rebuild supernumerary segment point part, and it retrieves at least some secrets and shares for rebuilding private key, and supernumerary segment point part is decrypted with the private key rebuild, Encryption Algorithm processing is carried out in plain text with key pair message, it is sent after obtaining node, after recipient receives node, use key identical with sender, and with the algorithm for inversion of the used Encryption Algorithm of sender, node is decrypted, is obtained in plain text;Broadcast by promoter signature and each part by encryption is into block chain, realize the various functions in relation to digital certificate management in authentication, and it by key, certificate and executes in record write-in block chain, dependence of the identity authorization system to original authentication center is substantially reduced, realizes that authentication overall process discloses, is transparent, can audit.

Description

Block chain encryption method for irreversible dynamic failure re-check reconstruction
Technical Field
The application relates to the technical field of block chains, in particular to a block chain encryption method for irreversible dynamic failure re-check reconstruction.
Background
Multiple Atomic Chain (MAC for short) is a third type of ecological system at the bottom of blockchain and ether house, and is dedicated to extend the business application boundary and technical boundary of blockchain technology, so that the public user can really feel the value of blockchain technology, and the blockchain can be applied to the development and application practice more directly instead of being stagnated at the academic theoretical level, and the development of the Multiple Atomic Chain is a spark of collision between the business application and the blockchain technology, and is a challenge to the blockchain prior art, and the thinking in the prior art is jumped out, and is a blockchain 3. 0 pioneer of the ecological application system. In the multi-primitive chain system, point-to-point value transfer can be realized through a value transmission protocol, and the characteristics of high performance, high throughput and rapidness and safety are the characteristics of the multi-primitive chain, so that a decentralized scene application development ecological platform supporting multiple industry fields (finance, Internet of things, supply chain, social contact, game, e-commerce, tracing, transaction and the like) is constructed by using the bottom layer of the multi-primitive chain.
In a public chain of multi-primitive chains (in the public blockchain system, anyone can read all over the world, anyone can send a transaction and the transaction can be validated, a blockchain in which anyone can participate in the consensus process (the consensus process decides which block can be added to the blockchain and makes explicit the current state), as an alternative to centralized or quasi-centralized trust, the security of the public blockchain is by "encrypted digital economy" in the form of a workload attestation mechanism or a rights attestation mechanism, combining an economic reward and encrypted digital verification, and following the general principle that the economic reward available from it is proportional to the contribution made to the consensus process.
Similar to the sharding mechanism of any distributed database, the sharding mechanism of NDPoS performs sharding based on the hash value of the partition key based on the DHT schema. In this mode, the precise query operation for specifying partition keys is extremely high in performance, while generally enabling uniform distribution of data throughout the cluster for uniformly distributed partition keys. However, if the query does not contain a partition key, the query must be broadcast to all partitions to obtain eligible records in all partitions. Unlike the final consistency of the DAG structure to transaction validation time that is unpredictable, NDPoS provides strong consistency across inter-chain transactions through a peer-to-peer multi-activity mechanism of block chains. Meanwhile, the NDPoS realizes infinite elastic expansion of the number of the whole network fragments through a layered proxy mechanism, and fundamentally solves the problem that the number of single-chain accounts cannot be excessive in performance and expansibility.
Disclosure of Invention
In view of the above, the present invention has been developed to provide an irreversible dynamic failure re-check reconstruction blockchain encryption method that overcomes or at least partially solves the above-mentioned problems.
The invention requests to protect an irreversible dynamic failure re-check reconstruction block chain encryption method, which is characterized by comprising the following steps:
encrypting the block chain link points by adopting an encryption function, using a public key to encrypt the encryption function, and setting a private key as decrypted data information;
if the decryption result carries the user identification, determining that the data entry is the data information of the user corresponding to the user identification;
identifying whether the decryption result is sent by a node on a blockchain, if so, creating a conditional balance between path nodes, and then sending a transaction initiator to a transaction receiver, namely a parameter field in supplement, of a transaction certificate;
according to the request of the client to access the file, retrieving the encryption block through a peer node to reconstruct the node adding part, retrieving at least some private shares for reconstructing a private key, and decrypting the node adding part by using the reconstructed private key;
broadcasting the initiator signature and the encrypted shares into a blockchain;
the sender uses the key to encrypt the message plaintext, and sends out the message plaintext after obtaining the node, and the receiver uses the same key as the sender after receiving the node and uses the inverse algorithm of the encryption algorithm used by the sender to decrypt the node to obtain the plaintext;
all transactions packaged by the current block are recorded in a Mercker tree mode, the field records the root hash value of the transaction tree, when each transaction enters the block to be packaged, the field needs to be recalculated and updated once, and the root value of the Mercker tree is the root node hash value of all recorded transactions in the block.
The block chain encryption method for irreversible dynamic failure review reconstruction realizes various functions related to digital certificate management in identity authentication through the confidentiality of an encryption function and the tamper resistance of a block chain technology, and writes a secret key, a certificate and an execution record into the block chain, thereby greatly reducing the dependence of an identity authentication system on an original authentication center and realizing the public, transparent and auditable whole process of the identity authentication.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
FIG. 1 is a flow chart illustrating a block chain encryption method for irreversible dynamic failure re-check reconstruction according to the present invention;
fig. 2 is a flowchart illustrating an embodiment of a block chain encryption method for irreversible dynamic failure re-check reconstruction according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Referring to fig. 1, a flow diagram of a block chain encryption method for irreversible dynamic failure re-check reconstruction according to the present invention is shown.
The invention requests to protect an irreversible dynamic failure re-check reconstruction block chain encryption method, which is characterized by comprising the following steps:
encrypting the block chain link points by adopting an encryption function, using a public key to encrypt the encryption function, and setting a private key as decrypted data information;
if the decryption result carries the user identification, determining that the data entry is the data information of the user corresponding to the user identification;
identifying whether the decryption result is sent by a node on a blockchain, if so, creating a conditional balance between path nodes, and then sending a transaction initiator to a transaction receiver, namely a parameter field in supplement, of a transaction certificate;
according to the request of the client to access the file, retrieving the encryption block through a peer node to reconstruct the node adding part, retrieving at least some private shares for reconstructing a private key, and decrypting the node adding part by using the reconstructed private key;
broadcasting the initiator signature and the encrypted shares into a blockchain;
the sender uses the key to encrypt the message plaintext, and sends out the message plaintext after obtaining the node, and the receiver uses the same key as the sender after receiving the node and uses the inverse algorithm of the encryption algorithm used by the sender to decrypt the node to obtain the plaintext;
all transactions packaged by the current block are recorded in a Mercker tree mode, the field records the root hash value of the transaction tree, when each transaction enters the block to be packaged, the field needs to be recalculated and updated once, and the root value of the Mercker tree is the root node hash value of all recorded transactions in the block.
Further, the encrypting the block link points by using the encryption function, the encrypting the block link points by using the public key, and the decrypting the data information by using the private key specifically include:
only the sharing of the sub public key and the sub private key is independently generated by each participant, and the participants know the respective secret sharing, so that any attacker who encrypts data under the public key cannot obtain the secret sharing of the master key and cannot obtain the information shared by any sub key;
the encryption function adopts a conic curve digital encryption algorithm, and firstly, a finite field is represented by using a function (1)Curve E above;
(1)
wherein,order setRepresents a set of all points (x, y) satisfying a function (1), wherein(ii) a In addition to this, the present invention is,also comprises a special point O; during initialization, common variables of a system need to be determined; selecting a root nodeThe order of G is n, and the main parameters of the conic section digital encryption algorithm areThe algorithm is described in detail as follows:
the key generation algorithm: randomly selecting integersCalculatingIf the public key is Q, the private key is d;
and (3) encryption algorithm: inputting a message m and a private key d, randomly selectingCalculatingConverting x into integer, calculatingIf r =0, k is reselected and calculated,For selected hash functions, calculatingIf s =0, k is reselected, and the encryption result pair (r, s) is output;
and (3) a verification algorithm: and inputting the encryption result pair (r, s), the message m and the public key G, and outputting legal if the following formula is established, or outputting illegal.
Preferably, if the decryption result carries the user identifier, determining that the data entry is the data information of the user corresponding to the user identifier specifically includes:
the hash value of the public key is used as an account address and is the only public identification of the account in the network, an issuing center certificate is generated through an issuing center private key and is used for issuing a user certificate, and a root certificate is an important tool of the operation of transaction signature and the like in an EPID format;
taking as input the certificate provided by the monitor and checking this certificate according to a domain certificate policy
A reconstruction list is specified that allows issuance of certificates for that particular domain. If the certificate is issued by a rebuild that is not on this list, a response policy is implemented that operates to transfer abnormally rebuilt blockchains to affected users and monitors that report violations.
Local storage is the simplest way to store the private key, and the private key is typically stored in a file format on a local disk or in a local database. When a transaction needs to be created, the blockchain client software reads the private key data, signs the transaction and broadcasts the signature to the network, and the blockchain public key of the user and the corresponding private key are automatically generated and backed up by the client regularly. The local storage has many advantages, firstly, because only the blockchain client can access the file directory of the private key, the user only needs to log in the client once, and can operate without additional authentication. Secondly, the storage space of the local disk is large, so that a large number of private keys can be stored. Finally, the user can generate the transaction by only using the blockchain client to perform some simple operations. However, this simple and convenient mode also poses a certain threat, such as that data of a private key file may be compromised
And malicious software reading, particularly when a user uses a network or shares data, a private key file directory needs to be prevented from being disclosed. In addition, the local equipment is prevented from physical accidents, such as damage, theft and the like. In order to improve the safety of local storage, an encryption wallet is proposed, which is a special local storage mode, and is different from the mode that a private key is directly stored on a disk, the encryption wallet encrypts a private key file and then stores the encrypted private key file in the local, and the encrypted secret is stored
The key is derived from a password selected by the user. Compared to local storage, the encryption wallet can be resistant to physical theft: even if the wallet device is stolen, the private key cannot be used without the password, but the digital theft is not meaningful, for example, if an attacker implants malicious software into the wallet device in advance and tracks and acquires the input password of the user, the password protection at the moment does not work any more.
Referring to fig. 2, a flow diagram of an embodiment of a block chain encryption method for irreversible dynamic failure re-check reconstruction according to an embodiment of the invention is shown.
Further, the sender uses the secret key to carry out encryption algorithm processing on the message plaintext to obtain a node and then sends out the node, and the receiver uses the secret key same as that of the sender after receiving the node and uses the inverse algorithm of the encryption algorithm used by the sender to decrypt the node to obtain the plaintext;
the new node will request the complete information of the block chain from the random complete node in the network, and when receiving the blocks, the new node will check the correctness of the blocks in turn according to the sequence on the block chain;
if the block data of the block chain cannot be synchronously completed in a delayed way, the new node can stand by for a period of time, and after a certain time threshold value is exceeded, the new node turns to other nodes to obtain the block chain data, and when the node is offline for too long time from the block chain network and is online again, block chain synchronous reconstruction is required;
if the participant agrees to sign, performing hash operation on the content to obtain a second hash value, encrypting the second hash value by using a private key of the participant to obtain a signature of the participant, and broadcasting the signature of the participant to the block chain;
the initiator can obtain the participant signature broadcast by each participant from the blockchain, decrypt the corresponding participant signature by using the participant public key of each participant respectively, if the decryption is successful, prove that the signature is the signature of the corresponding participant, and if the decryption is failed, prove that the signature is not the signature of the participant.
When the failure reconstruction is realized, some data structures are designed, which are mainly used for convenience, stored in a database in a binary mode through a serialization method during storage, and read into a memory through an deserialization method during reading.
Rebuilding certificate chain table
Initially, the reconstruction certificate is added to the linked list, which has only one element. When the reconstruction key is replaced, the corresponding new reconstruction certificate is also requested to be stored, and the new reconstruction certificate is added to the end of the single linked list.
Verifying certificates
When a user inquires and verifies the validity of a certain certificate, the information of an issuer is obtained according to the certificate, then the certificate is traversed in a reconstruction certificate chain table, and after finding out the information, the certificate is verified to verify whether the signature of the certificate is issued by the corresponding reconstruction certificate. And if the signature is failed to be verified or cannot be found, the certificate is invalid.
Identity authentication
When a new certificate issuance request is received, the latest reconstruction certificate, that is, the certificate at the end of the linked list, needs to be used for verification. If the verification is successful, the certificate is a valid certificate, and subsequent storage is carried out. Otherwise, the certificate is considered to be illegal, and failure is returned.
Further, all transactions in the current block packing are recorded in a mercker tree, the field records a tree root hash value of the transaction tree, when each transaction enters a block to be packed, the field needs to be recalculated and updated once, and the root value of the mercker tree is a root node hash value of all recorded transactions in the block, and the method specifically includes:
the whole node determines all blocks possibly including the transaction according to the characteristics of the transaction, at this time, the blocks of nearby time can be determined according to the transaction timestamp, the whole node searches the transaction information from the possible blocks, generates a Merkle tree of all transactions of the whole blocks, calculates a Merkle authentication path of the information, and returns the authentication path to the SPV node, and at this time, the Merkle technology is used;
the communication network of the blockchain system is a centerless, point-to-point broadcast network that is used to broadcast newly generated transactions and blocks. All nodes in the network are equal, and the topology of the network is random. When a new node wants to join the network, the new node only needs to communicate with one known node, the node is called a seed node, the seed node broadcasts the known node to the new access node, and after the steps are repeated for many times, the new access node can communicate with a plurality of nodes. The nodes issue messages through the mechanism: when the node sends out a connection request, the node simultaneously broadcasts out the connection information of the node, and when the node receives the connection request, the node also inquires the connection information. The mechanism establishes an effective random network and can quickly broadcast information;
when a user communicates on a block chain and other behaviors needing security requirements, data entries of the user are encrypted, and under the condition that indexes and data keys are not lost, each user has a complete plaintext state of all own data;
the Merkle tree is used to summarize all transactions in a block, while generating a digital fingerprint of the entire transaction set, and provides an efficient way to verify whether a transaction exists in a block. Generating a complete Merkle tree requires recursively hashing a pair of nodes and inserting the newly generated hash node into the Merkle tree until only one hash node remains, which is the root of the Merkle tree;
when a user in the blockchain wants to obtain the plaintext data of other users, the user must be authorized to obtain the plaintext data. It should be noted that, the index of each data entry includes that the user identifier in the user identifier is not in a plaintext state, and the user identifier can be obtained only after the index of the data entry is decrypted.
To protect against malware attacks, the private key may be stored on the portable device offline. The private key may be printed on paper, stored on a USB device, etc., for example. The protection of the private key becomes a physical security issue and can be protected in a conventional manner, such as placing the portable device in a safe. Offline storage also has the disadvantage that it cannot create transactions, each time a private key signature is used a signature is generated by means of a computable device and issued to the network. Offline storage is suitable for backing up the private key, in which case the offline device needs to update the private key periodically in order to keep it synchronized with other blockchain wallets.
The dynamic node in the block chain network collects the newly generated transactions in the network in the last period of time, firstly, the dynamic node checks whether the received transactions are legal or not, and after the checks are successful, the dynamic node adds the transactions into a transaction confirmation queue to wait for confirmation. Dynamically combining the transactions to be confirmed into a block of data, and then determining who can confirm the transactions by competing for the workload proving problem, the first node solving the workload proving problem is considered to be paying sufficient calculation power to confirm the transactions. Then the node broadcasts its own block to the whole network, and informs other nodes in the network to add its own block to the back of the original block chain.
Based on a symmetric and asymmetric double encryption algorithm in a cryptology theory, the irreversible quadruple encryption (Token + public key + private key + dynamic failure double-check reconstruction) + a unique core algorithm originally created by a multi-original-chain technical team is integrated, so that contract transmission, transaction and data are safer, and cracking becomes history. The multi-original-chain technical team originally creates a full-point intercommunication communication protocol, permission DIY, and can establish point-to-point communication in application, linear communication between application packages, linear communication between application A and application B and public-chain bridging communication on the premise of following a multi-original-chain platform protocol. To achieve the diversity and flexibility of contracts, tokens, and business processes.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (7)

CN201910372173.9A2019-05-062019-05-06A kind of block chain encryption method that irreversible dynamic failure re-examination is rebuildPendingCN110149322A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201910372173.9ACN110149322A (en)2019-05-062019-05-06A kind of block chain encryption method that irreversible dynamic failure re-examination is rebuild

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201910372173.9ACN110149322A (en)2019-05-062019-05-06A kind of block chain encryption method that irreversible dynamic failure re-examination is rebuild

Publications (1)

Publication NumberPublication Date
CN110149322Atrue CN110149322A (en)2019-08-20

Family

ID=67594801

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201910372173.9APendingCN110149322A (en)2019-05-062019-05-06A kind of block chain encryption method that irreversible dynamic failure re-examination is rebuild

Country Status (1)

CountryLink
CN (1)CN110149322A (en)

Cited By (25)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110912707A (en)*2019-11-222020-03-24腾讯科技(深圳)有限公司Block chain-based digital certificate processing method, device, equipment and storage medium
CN111199371A (en)*2019-12-272020-05-26航天信息股份有限公司Grain circulation tracing release verification method and system based on block chain
CN111343187A (en)*2020-03-042020-06-26开采夫(杭州)科技有限公司Block chain data encryption method using space-time information as function model
CN111614658A (en)*2020-05-192020-09-01深圳杰微芯片科技有限公司Calculation force contract generation method based on block chain network, electronic device and medium
CN111866066A (en)*2020-06-042020-10-30江苏理工学院 Consensus Algorithm for Internet of Vehicles Based on DPoS
CN112333187A (en)*2020-11-042021-02-05齐鲁工业大学Intelligent edge calculation method and intelligent edge system based on block chain
CN112333173A (en)*2020-03-112021-02-05合肥达朴汇联科技有限公司Data transmission method, system, equipment and storage medium based on data provider
CN112507352A (en)*2020-11-302021-03-16中国联合网络通信集团有限公司Data sharing method and system based on block chain
CN112699406A (en)*2020-12-302021-04-23浙江飞图影像科技有限公司Block chain-based medical image data security management method and system
CN112907247A (en)*2021-03-182021-06-04上海能链众合科技有限公司Block chain authorization calculation control method
CN113034139A (en)*2021-03-152021-06-25中国人民大学Block chain multi-currency wallet based on living body biological feature authentication and implementation method thereof
CN113127818A (en)*2019-12-312021-07-16数网金融有限公司Block chain-based data authorization method and device and readable storage medium
CN113258593A (en)*2021-06-182021-08-13广东新电电力科技有限公司Three-phase imbalance online treatment platform and method
CN113570369A (en)*2021-07-292021-10-29成都质数斯达克科技有限公司Block chain privacy transaction method, device, equipment and readable storage medium
CN114025346A (en)*2021-10-122022-02-08杭州趣链科技有限公司Safe and effective data transmission method for data between mobile self-set networks
CN114077744A (en)*2020-08-132022-02-22续科天下(北京)科技有限公司 Blockchain general asset processing method, device, equipment and storage medium
CN114334110A (en)*2021-12-282022-04-12中国联合网络通信集团有限公司Reservation method, block chain system, electronic device and computer readable medium
CN114586315A (en)*2019-08-292022-06-03美国运通旅游有关服务公司 Decentralized data authentication
CN114866595A (en)*2022-04-022022-08-05深圳力维智联技术有限公司Connection method, end station data acquisition unit and management platform
CN114978730A (en)*2022-05-272022-08-30深圳铸泰科技有限公司Security detection method and storage medium for Internet of things at perception situation
CN115150103A (en)*2022-08-292022-10-04人民法院信息技术服务中心Block chain-based digital certificate offline verification method, device and equipment
CN115389724A (en)*2022-07-262022-11-25海晟科技(浙江)有限公司 An online monitoring system for sewage disinfection applied in shelter hospitals
CN115459921A (en)*2022-08-252022-12-09浪潮云信息技术股份公司Cross-chain method and system based on proxy re-encryption and directed acyclic graph
CN116318709A (en)*2023-02-092023-06-23湖北邮电规划设计有限公司 A method and system for project division and collaboration based on blockchain technology
CN119628841A (en)*2024-12-102025-03-14浙江卓蚁网络科技有限公司 Trusted asymmetric encryption communication protocol for edge computing gateway driven by certificate chain

Cited By (42)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN114586315A (en)*2019-08-292022-06-03美国运通旅游有关服务公司 Decentralized data authentication
CN110912707A (en)*2019-11-222020-03-24腾讯科技(深圳)有限公司Block chain-based digital certificate processing method, device, equipment and storage medium
CN111199371A (en)*2019-12-272020-05-26航天信息股份有限公司Grain circulation tracing release verification method and system based on block chain
CN111199371B (en)*2019-12-272024-02-20航天信息股份有限公司Grain circulation tracing release verification method and system based on blockchain
CN113127818A (en)*2019-12-312021-07-16数网金融有限公司Block chain-based data authorization method and device and readable storage medium
CN111343187A (en)*2020-03-042020-06-26开采夫(杭州)科技有限公司Block chain data encryption method using space-time information as function model
CN111343187B (en)*2020-03-042022-04-05开采夫(杭州)科技有限公司Block chain data encryption method using space-time information as function model
CN112333173A (en)*2020-03-112021-02-05合肥达朴汇联科技有限公司Data transmission method, system, equipment and storage medium based on data provider
CN112333173B (en)*2020-03-112023-07-04合肥达朴汇联科技有限公司Data transmission method, system, equipment and storage medium based on data provider
CN111614658A (en)*2020-05-192020-09-01深圳杰微芯片科技有限公司Calculation force contract generation method based on block chain network, electronic device and medium
CN111866066B (en)*2020-06-042023-11-07江苏理工学院Internet of vehicles consensus algorithm based on DPoS
CN111866066A (en)*2020-06-042020-10-30江苏理工学院 Consensus Algorithm for Internet of Vehicles Based on DPoS
CN114077744A (en)*2020-08-132022-02-22续科天下(北京)科技有限公司 Blockchain general asset processing method, device, equipment and storage medium
CN112333187B (en)*2020-11-042022-08-09齐鲁工业大学Intelligent edge calculation method and intelligent edge system based on block chain
CN112333187A (en)*2020-11-042021-02-05齐鲁工业大学Intelligent edge calculation method and intelligent edge system based on block chain
CN112507352B (en)*2020-11-302023-01-17中国联合网络通信集团有限公司 Blockchain-based data sharing method and system
CN112507352A (en)*2020-11-302021-03-16中国联合网络通信集团有限公司Data sharing method and system based on block chain
CN112699406A (en)*2020-12-302021-04-23浙江飞图影像科技有限公司Block chain-based medical image data security management method and system
CN113034139B (en)*2021-03-152023-12-26中国人民大学Block chain multi-coin wallet based on living organism biological characteristic authentication and implementation method thereof
CN113034139A (en)*2021-03-152021-06-25中国人民大学Block chain multi-currency wallet based on living body biological feature authentication and implementation method thereof
CN112907247B (en)*2021-03-182024-01-26上海零数众合信息科技有限公司Block chain authorization calculation control method
CN112907247A (en)*2021-03-182021-06-04上海能链众合科技有限公司Block chain authorization calculation control method
CN113258593B (en)*2021-06-182023-04-18广东新电电力科技有限公司Three-phase imbalance online treatment platform and method
CN113258593A (en)*2021-06-182021-08-13广东新电电力科技有限公司Three-phase imbalance online treatment platform and method
CN113570369B (en)*2021-07-292024-05-28成都质数斯达克科技有限公司Block chain privacy transaction method, device, equipment and readable storage medium
CN113570369A (en)*2021-07-292021-10-29成都质数斯达克科技有限公司Block chain privacy transaction method, device, equipment and readable storage medium
CN114025346B (en)*2021-10-122024-03-29杭州趣链科技有限公司Data transmission method for data security and effectiveness between mobile self-setting networks
CN114025346A (en)*2021-10-122022-02-08杭州趣链科技有限公司Safe and effective data transmission method for data between mobile self-set networks
CN114334110B (en)*2021-12-282023-01-17中国联合网络通信集团有限公司Reservation method, block chain system, electronic device and computer readable medium
CN114334110A (en)*2021-12-282022-04-12中国联合网络通信集团有限公司Reservation method, block chain system, electronic device and computer readable medium
CN114866595A (en)*2022-04-022022-08-05深圳力维智联技术有限公司Connection method, end station data acquisition unit and management platform
CN114866595B (en)*2022-04-022024-02-27深圳力维智联技术有限公司Connection method, terminal station data collector and management platform
CN114978730B (en)*2022-05-272023-09-15深圳铸泰科技有限公司Security detection method and storage medium for Internet of things at perceived situation
CN114978730A (en)*2022-05-272022-08-30深圳铸泰科技有限公司Security detection method and storage medium for Internet of things at perception situation
CN115389724A (en)*2022-07-262022-11-25海晟科技(浙江)有限公司 An online monitoring system for sewage disinfection applied in shelter hospitals
CN115459921A (en)*2022-08-252022-12-09浪潮云信息技术股份公司Cross-chain method and system based on proxy re-encryption and directed acyclic graph
CN115459921B (en)*2022-08-252024-04-30浪潮云信息技术股份公司Agent re-encryption and directed acyclic graph-based cross-chain method and system
CN115150103A (en)*2022-08-292022-10-04人民法院信息技术服务中心Block chain-based digital certificate offline verification method, device and equipment
CN115150103B (en)*2022-08-292022-11-29人民法院信息技术服务中心 Blockchain-based digital certificate offline verification method, device and equipment
CN116318709A (en)*2023-02-092023-06-23湖北邮电规划设计有限公司 A method and system for project division and collaboration based on blockchain technology
CN116318709B (en)*2023-02-092025-02-07湖北邮电规划设计有限公司 A method and system for project division of labor and collaboration based on blockchain technology
CN119628841A (en)*2024-12-102025-03-14浙江卓蚁网络科技有限公司 Trusted asymmetric encryption communication protocol for edge computing gateway driven by certificate chain

Similar Documents

PublicationPublication DateTitle
CN110149322A (en)A kind of block chain encryption method that irreversible dynamic failure re-examination is rebuild
AU2019204725B2 (en)Retrieving access data for blockchain networks using highly available trusted execution environments
US10810315B2 (en)Enabling access to data
CN111523133B (en)Block chain and cloud data collaborative sharing method
Premkamal et al.Enhanced attribute based access control with secure deduplication for big data storage in cloud
US10805076B2 (en)Information processing apparatus, server apparatus, and computer program product
WO2019191378A1 (en)Threshold secret share authentication proof and secure blockchain voting with hardware security modules
CN111130757A (en)Multi-cloud CP-ABE access control method based on block chain
CN115176441A (en)Identity-based public key generation protocol
CN111526197B (en)Cloud data secure sharing method
KR20190012969A (en)Data access management system based on blockchain and method thereof
CN117240452B (en)Plateau data safe sharing method based on block chain
Gajmal et al.Blockchain-based access control and data sharing mechanism in cloud decentralized storage system
CN114666037A (en)Auditable data deduplication method based on block chain
CN114866244A (en)Controllable anonymous authentication method, system and device based on ciphertext block chaining encryption
Tian et al.An efficient scheme of cloud data assured deletion
CN115001730B (en)Access control system and method based on role attribute in distributed scene
CN111541731A (en) A method for electronic file access control based on blockchain and know-how encryption
Ramprasath et al.Protected data sharing using attribute based encryption for remote data checking in cloud environment
CN117648706B (en)Access control method based on block chain and attribute encryption
Khudaier et al.A Review of Assured Data Deletion Security Techniques in Cloud Storage
Aziz et al.Assured data deletion in cloud computing: security analysis and requirements
Li et al.Searchable proxy re-encryption data sharing scheme based on consortium chain
Jiang et al.Unified identity authentication system based on blockchain
US20250181742A1 (en)Digital storage and data transport system using file fragments assigned to data storage packets

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
TA01Transfer of patent application right
TA01Transfer of patent application right

Effective date of registration:20191225

Address after:350000 Yuanfu garden, no.196, middle lianjiang Road, Jin'an District, Fuzhou City, Fujian Province

Applicant after:Li Baoci

Applicant after:Shandong Gongchain Information Technology Co., Ltd.

Address before:Room 301, 15 Yanzishan Road, Lixia District, Jinan City, Shandong Province, 250000

Applicant before:Shandong Gongchain Information Technology Co., Ltd.

RJ01Rejection of invention patent application after publication
RJ01Rejection of invention patent application after publication

Application publication date:20190820


[8]ページ先頭

©2009-2025 Movatter.jp