File encryption transmission method based on cloud computing
A technology of file encryption and transmission method, applied in the field of data transmission, to achieve the effect of simple system and easy construction
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0032] The file encryption transmission method based on cloud computing includes industry blockchain and private blockchain, including the following steps:
[0033] A. Establish an industry blockchain, each user of the industry blockchain is a node, and all users of the industry blockchain designate multiple nodes as bookkeepers;
[0034] B. Assign a unique verification code to each node in step A, and establish a verification code list on the network layer of the industry blockchain established in step A; establish an industry blockchain block search directory;
[0035] C. Establish a private blockchain between each user and other users. Any two users are connected through two private blockchains, and the two users are bookkeepers of the two private chains;
[0036] It also includes the following steps for data encryption transmission:
[0037] D. When generating encrypted data that needs to be sent, the node that needs to send the data initiates a request to create a new en...
Embodiment 2
[0045] Further, the consensus mechanism of the bookkeeper adopts a DPoS mechanism. The DPoS mechanism further reduces the number of nodes to 101. On the premise of ensuring network security, the energy consumption of the entire network is further reduced, and the network operating cost is the lowest. The DPoS mechanism is more decentralized. The DPoS mechanism also has a faster confirmation speed. The time for each block is 10 seconds, one data exchange, that is, it takes about 1 minute to get 6-10 confirmations, and a complete cycle of 101 blocks only takes about 16 minutes. The PoW mechanism takes 10 minutes to generate a block, and a data exchange takes 1 hour. It takes about 1 hour for the PoS mechanism to confirm a transaction.
[0046] Further, the information stored in the retrieval directory includes information of sending data nodes and information of receiving data nodes.
[0047] Further, the method for the bookkeeper in the step E to verify the transaction data...
Embodiment 3
[0053] The file encryption transmission method based on cloud computing includes industry blockchain and private blockchain, including the following steps:
[0054] A. Establish an industry blockchain, each user of the industry blockchain is a node, and all users of the industry blockchain designate multiple nodes as bookkeepers;
[0055] B. Assign a unique verification code to each node in step A, and establish a verification code list on the network layer of the industry blockchain established in step A; establish an industry blockchain block search directory;
[0056] C. Establish a private blockchain between each user and other users. Any two users are connected through two private blockchains, and the two users are bookkeepers of the two private chains;
[0057] It also includes the following steps of data encryption transmission:
[0058] D. When generating encrypted data that needs to be sent, the node that needs to send the data initiates a request to create a new enc...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More