A safety application method and system based on a block chain

A security application, block chain technology, applied in the direction of digital data protection, platform integrity maintenance, etc., can solve the problem that ordinary users cannot trace back

Inactive Publication Date: 2019-05-03
SHENZHEN POWER SUPPLY BUREAU
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the malicious application is taken of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A safety application method and system based on a block chain
  • A safety application method and system based on a block chain
  • A safety application method and system based on a block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The core content of this patent is to use the property that the data of each node in the blockchain is not easy to change, and compare the first hash value when the application is released and the second hash value calculated when the application is downloaded, to determine whether the application is a malicious application , the specific implementation of the method will be further described below in conjunction with the accompanying drawings and embodiments.

[0039] Embodiments of the blockchain-based security application method and system provided by the present invention will be described in detail below.

[0040] Such as figure 1 As shown, the embodiment of the present invention provides a blockchain-based security application method, the method comprising:

[0041] Step S11, receiving the released smart contract, the smart contract includes the application program to be released, the description information of the application program to be released, integrity in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security application method and system based on a block chain. The method comprises the steps that a published intelligent contract is received, the intelligent contract comprises a to-be-published application program, description information, integrity information and a first hash value of the to-be-published application program, and the description information comprisesa link address and an identifier of the to-be-published application program; running a consensus mechanism, packaging the description information, the integrity information and the first hash value ofthe application program to be published by the leader node to form a first block, and writing the first block into a block chain; updating the blockchain account book; and informing an application market of putting the to-be-released application on the shelf. According to the method, the blockchain technology is utilized, the unsafe application program is identified by comparing the first hash value calculated by the publisher with the second hash value calculated by the intelligent terminal, and the problem of high difficulty in identifying the malicious application program in the application market in the prior art is solved.

Description

technical field [0001] The present invention relates to the technical field of block chains, in particular to a block chain-based security application method and system. Background technique [0002] In the traditional mobile application market, ordinary users are accustomed to downloading applications from the mobile application market. Firstly, the application developer publishes the application, and then the application market puts it on the shelves, and the user can download the required application program in the mobile market. At the same time, regulators are able to police malicious behavior. Objectively speaking, it is difficult to require ordinary users to have the ability to identify malicious applications. [0003] The difficulty lies in that the mobile terminals of ordinary users usually have only one application market. Users cannot ensure that the application market is completely credible, cannot confirm whether the application program comes from a legitimate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F21/64
Inventor 孙强强连耿雄蒋新竹刘则君
Owner SHENZHEN POWER SUPPLY BUREAU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products