Unlock instant, AI-driven research and patent intelligence for your innovation.

File encryption transmission method based on cloud computing

A technology of file encryption and transmission method, applied in the field of data transmission, to achieve the effect of simple system and easy construction

Active Publication Date: 2021-07-20
河南智慧云大数据有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a file encryption transmission method based on cloud computing, which solves the problem that the existing data transmission technology using block chain encryption is generally used to prevent users who are not nodes of the block chain from obtaining block chain information. There is no problem with the technology used for node-to-node encryption inside the blockchain

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] The file encryption transmission method based on cloud computing includes industry blockchain and private blockchain, including the following steps:

[0033] A. Establish an industry blockchain, each user of the industry blockchain is a node, and all users of the industry blockchain designate multiple nodes as bookkeepers;

[0034] B. Assign a unique verification code to each node in step A, and establish a verification code list on the network layer of the industry blockchain established in step A; establish an industry blockchain block search directory;

[0035] C. Establish a private blockchain between each user and other users. Any two users are connected through two private blockchains, and the two users are bookkeepers of the two private chains;

[0036] It also includes the following steps for data encryption transmission:

[0037] D. When generating encrypted data that needs to be sent, the node that needs to send the data initiates a request to create a new en...

Embodiment 2

[0045] Further, the consensus mechanism of the bookkeeper adopts a DPoS mechanism. The DPoS mechanism further reduces the number of nodes to 101. On the premise of ensuring network security, the energy consumption of the entire network is further reduced, and the network operating cost is the lowest. The DPoS mechanism is more decentralized. The DPoS mechanism also has a faster confirmation speed. The time for each block is 10 seconds, one data exchange, that is, it takes about 1 minute to get 6-10 confirmations, and a complete cycle of 101 blocks only takes about 16 minutes. The PoW mechanism takes 10 minutes to generate a block, and a data exchange takes 1 hour. It takes about 1 hour for the PoS mechanism to confirm a transaction.

[0046] Further, the information stored in the retrieval directory includes information of sending data nodes and information of receiving data nodes.

[0047] Further, the method for the bookkeeper in the step E to verify the transaction data...

Embodiment 3

[0053] The file encryption transmission method based on cloud computing includes industry blockchain and private blockchain, including the following steps:

[0054] A. Establish an industry blockchain, each user of the industry blockchain is a node, and all users of the industry blockchain designate multiple nodes as bookkeepers;

[0055] B. Assign a unique verification code to each node in step A, and establish a verification code list on the network layer of the industry blockchain established in step A; establish an industry blockchain block search directory;

[0056] C. Establish a private blockchain between each user and other users. Any two users are connected through two private blockchains, and the two users are bookkeepers of the two private chains;

[0057] It also includes the following steps of data encryption transmission:

[0058] D. When generating encrypted data that needs to be sent, the node that needs to send the data initiates a request to create a new enc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a file encryption transmission method based on cloud computing. Using the above method, when encrypted data needs to be sent between nodes, the node that sends the data first creates a new encrypted data block on the industry chain and sends it to the industry chain The establishment of the broadcast encrypted data block is archived in the industry chain to ensure the inalterability of the data. If the private chain is used to send the encrypted data directly, other nodes in the industry do not participate in the data storage, and the inalterability of the data cannot be guaranteed; The private chain sends the decryption parameters to the nodes that need to receive the encrypted data, and the nodes that need to receive the encrypted data read the data of the encrypted data block on the industry chain and use the decryption parameters on the private chain to decrypt, so that the data cannot be changed And encrypted transmission function.

Description

technical field [0001] The invention relates to the field of data transmission, in particular to a file encryption transmission method based on cloud computing. Background technique [0002] With the rapid development of Internet technology, network information is more abundant, network transactions are more frequent, network original works emerge in endlessly, e-government affairs, information construction of enterprises and institutions are also becoming more and more perfect, and the amount of data is constantly increasing. While enjoying the convenience that Internet technology brings to life and work, we also face potential risks and hidden dangers brought about by the Internet and informatization. [0003] Industry blockchain: multiple pre-selected nodes are designated as bookkeepers within a certain group, and the generation of each block is jointly decided by all pre-selected nodes (pre-selected nodes participate in the consensus process), other access nodes can part...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q40/04G06F21/64G06F21/60H04L29/06H04L29/08
CPCG06F21/602G06F21/64G06Q40/04H04L63/0428H04L67/10
Inventor 张军李文法安磊靳少华
Owner 河南智慧云大数据有限公司