Unlock instant, AI-driven research and patent intelligence for your innovation.

A data tamper-proofing method based on a block chain

A tamper-proof and blockchain technology, applied in the direction of digital data protection, etc., can solve the problems of poor readability of operation logs, inability to store data, loss, etc.

Active Publication Date: 2019-04-16
HANGZHOU QULIAN TECH CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Due to the public and non-tamperable nature of the blockchain itself, some data that does not want to be disclosed cannot be stored in the blockchain. At the same time, the data stored in the blockchain needs to go through the consensus process, resulting in long storage time and low efficiency. low
[0004] The database can store the required data, but in frequent read and write operations, it is difficult to find out whether the data has been tampered with, and the lag is serious. Once the problem is found, irreparable losses may have been caused
[0005] Although you can find out whether the data has been tampered with by querying the database logs, the readability of a large number of operation logs is poor, the operation is difficult, and it is difficult to distinguish between normal modification and malicious tampering
Directly query and obtain the data in the blockchain for comparison. Although data tampering can also be found, it takes a long time and is inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data tamper-proofing method based on a block chain
  • A data tamper-proofing method based on a block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0054] Simulate a process that uses data tamper protection methods such as figure 1 As shown in , the user processes the stored data into a publicly available form and sends the data to the tamper-proof node.

[0055] The anti-tampering node obtains the local record table of the node from the local, and obtains the latest error table array from the chain. Simultaneously start merging error table sequence fields in all local record tables.

[0056] The anti-tampering node checks one by one from the last table to the front, and if it is found that the tampered record table needs to update the error table array.

[0057] The tamper-proof node receives the data sent by the user, and stores it in the local record pool after a unified style of processing.

[0058] When the number of records in the record pool reaches a certain number, or the latest time for table release is reached, the records in the record pool are packaged into a record table. The packaging process is as follow...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data tamper-proofing method based on a block chain. The data storage structure is designed in a chained mode, a block chain technology is used as a data backup means, storageand verification are separated, and the effects that public information can be shared and tampering is prevented are achieved. The tamper-proofing system based on the block chain is realized, and theproblems that data is opaque and is difficult to recover after tampering are solved.

Description

technical field [0001] The invention relates to a data storage protocol based on block chain technology, in particular to a data tamper-proof method based on block chain. Background technique [0002] Blockchain technology, blockchain is a new type of decentralized distributed ledger technology, which can safely store digital currency transactions or other data. It is characterized by the fact that the information stored on the blockchain cannot be forged and tampered with. The algorithm drives every node on the blockchain to participate in the transaction verification process to ensure that the transactions on the blockchain are confirmed and credible. Each node on the blockchain maintains a public ledger for storage For the balance and smart contract data of all users on the blockchain network, any modification of the ledger maintained by any node will not be recognized by other nodes, thus ensuring that the public ledger cannot be forged and tampered with. [0003] Due t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64
CPCG06F21/64
Inventor 李伟邱炜伟梁秀波李启雷尹可挺
Owner HANGZHOU QULIAN TECH CO LTD