A blockchain-based data tamper-proof method
A tamper-proof, blockchain technology, applied in digital data protection and other directions, can solve the problems of data inability to store, long storage time, time-consuming and low efficiency, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0054] Simulate a process that uses data tamper protection methods such as figure 1 As shown in , the user processes the stored data into a publicly available form and sends the data to the tamper-proof node.
[0055] The anti-tampering node obtains the local record table of the node from the local, and obtains the latest error table array from the chain. Simultaneously start merging error table sequence fields in all local record tables.
[0056] The anti-tampering node checks one by one from the last table to the front, and if it is found that the tampered record table needs to update the error table array.
[0057] The tamper-proof node receives the data sent by the user, and stores it in the local record pool after a unified style of processing.
[0058] When the number of records in the record pool reaches a certain number, or the latest time for table release is reached, the records in the record pool are packaged into a record table. The packaging process is as follow...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

