Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security network attachment device and method for block chain

An additional device and security network technology, which is applied in the field of blockchain information security protection devices to achieve the effect of avoiding access

Active Publication Date: 2017-01-11
广东中云智安科技有限公司
View PDF3 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Computing and storage are the two basic tasks of computer systems. With the explosive growth of information, storage components will experience direct-connected storage based on a single server, cluster grid storage based on a LAN, and finally develop into a data grid based on a wide area network. Blockchain technology is at the very end of the current development. The intrinsic characteristics of this data storage medium include intelligent storage, storage service quality can guarantee service differentiation and performance guarantee for user applications, storage is object-oriented mass storage, and Network storage must be guaranteed to be confidential, complete and secure. The existing Internet does not have a good or convenient way to ensure the confidentiality, integrity, availability, and Non-repudiation and the reliable performance of the entire network storage system, especially the emergence of blockchain trusted computing technology in recent years, put forward higher requirements for network storage security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security network attachment device and method for block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0018] Example: see figure 1 , an additional device and method for a blockchain security network, by encrypting data and only decrypting it on the client side to prevent any unauthorized user from accessing the data, it can avoid threats caused by system administrator access and physical capture of the disk potential threat. The client's decryption depends on the decryption key provided by the key management system. Wherein the confidentiality of the attachment relies on a lock box mechanism which stores the key. Each file is encrypted with a symmetric key. Inside the metadata of the file is a pointer to the key body. Inside the metadata of the key body are the ID of the file, the ID of the user who created the file, and the ID of the last modified file. User's signature. This signature can prove to other users that the key body itself has not been altered (of course any authorized user can verify this signature). The key body here is composed of some tuples consistent wit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a security network attachment device for a block chain. The security network attachment device for the block chain comprises a key management system, a box locking mechanism, a certificate and a storage device; the key management system is used for providing a decryption key; the box locking mechanism is used for storing a key, wherein the key is stored in a unique trusted server and is supplied to a user who accesses a file; the certificate is used for managing an authorized user; and the storage device is used for storing the non-linear checksum of original data and an encrypted result. The user can verify whether the file is modified when the file is stored through the storage device. The user can verify the integrity of writing through verifying and analyzing the metadata file of the key body of the file and verifying a provided digital signature. With the security network attachment device and method of the invention, based on data encryption, decryption is carried out a client only, so that any unauthorized users can be prevented from accessing data, and potential threats caused by accesses threatening a system administrator and physical capture for a magnetic disk can be avoided.

Description

technical field [0001] The invention relates to the security problem of the block chain, in particular to a block chain information security protection device, a safety network attachment device and a method. Background technique [0002] The emergence of Bitcoin in 2009 brought a subversive result - block chain technology, block chain is a secure ledger database, composed of data blocks, users can continuously update and upgrade For financial institutions, blockchain can speed up transaction processing, reduce costs, reduce middlemen, improve market insight, and increase business transparency. [0003] Computing and storage are the two basic tasks of computer systems. With the explosive growth of information, storage components will experience direct-connected storage based on a single server, cluster grid storage based on a LAN, and finally develop into a data grid based on a wide area network. Blockchain technology is at the very end of the current development. The intri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3242H04L9/3247H04L9/3263H04L9/3297H04L63/045H04L9/32
Inventor 张丛
Owner 广东中云智安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products