Decentralized storage security implementation method

A technology of decentralization and implementation methods, applied in the field of blockchain, can solve problems such as single point of failure, and achieve the effect of safe storage and effective use

Active Publication Date: 2018-08-21
CHENGDU RES INST OF UESTC
View PDF4 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this also means that once an illegal user enters the system, all data can be accessed, and there is a single point of failure problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decentralized storage security implementation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The following and accompanying appendices illustrating the principles of the invention Figure 1 A detailed description of one or more embodiments of the invention is provided together. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details.

[0018] One aspect of the present invention provides a decentralized storage security implementation method. figure 1 It is a flowchart of a method for implementing decentralized storage security according to an embodiment of the presen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a decentralized storage security implementation method. The method comprises the following steps: building an electronic evidence private block chain by three types of affair main bodies, namely a notary organization, a user organization and a judicial organ; and storing information abstracts and specific data of electronic evidences of users into positions in a distributedtype file system, and forming a block chain by blocks of same structures through chain structures. The invention provides the decentralized storage security implementation method, which effectively implements secure storage and effective use of the electronic evidences of the users.

Description

technical field [0001] The present invention relates to block chain technology, in particular to a decentralized storage security implementation method. Background technique [0002] Electronic evidence involves privacy and security issues, and only authorized users can access relevant electronic evidence. Data anonymity can be used to protect the security of personal electronic evidence data. In terms of data privacy protection, there are already a variety of technologies for privacy protection of personal data. Including making each private information indistinguishable from other records by constructing an anonymous data set, or realizing privacy protection by redistributing private information, or encrypting private data and allowing any calculation to run on the ciphertext. The traditional electronic evidence storage mode adopts a centralized mode, and the data security model relies on the establishment of multi-factor authentication access control. However, this als...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/06H04L29/08G06F21/62
CPCG06F21/6254H04L9/0643H04L9/3236H04L9/3247H04L9/3297H04L63/0435H04L63/10H04L63/108H04L67/1097
Inventor 张明张力刘伟汤维冯冲陈雪王晓丹
Owner CHENGDU RES INST OF UESTC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products