Unlock instant, AI-driven research and patent intelligence for your innovation.

data network transmission security protection method based on DNA features and a block chain and a computer readable storage medium

A data network and security protection technology, applied in the field of data security to achieve the effect of improving security

Active Publication Date: 2019-05-14
播金信息科技(上海)有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] As we all know, since the informatization and dataization of science and technology have been widely used, the storage and transmission of information data has become an unavoidable core focus in the process of information system and engineering planning. Since storage technology, database technology, communication transmission technology Since its birth, all data storage and transmission are stored and transmitted in accordance with the inherent rules unique to the bearing equipment to ensure that the data can be copied, backed up and transmitted. This is also the market for data storage and transmission. The main points of appeal and universality, and in today's rapid development of technology informatization, data storage and data communication, the emergence of various sensitive data, key information penetration, specific application scenarios with high security requirements and distributed application technologies and popularization, new security challenges and higher requirements have been put forward for the underlying storage and communication transmission of information data. The easy copying, copying and dissemination of information data have brought us various Such problems and more or less impacts and harms are just that we have not noticed or paid attention to them in this process, and this process is irreversible and irreparable. Huge loopholes and bottlenecks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • data network transmission security protection method based on DNA features and a block chain and a computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0042] As an embodiment of the present invention, the method further includes that the first road-associated data further includes making the receiving end confirm the right of the receiving end according to the DNA characteristics of the receiving end when the receiving end wants to read the extracted data, and by confirming the right The receiving end can realize the data reading.

[0043] As an embodiment of the present invention, the method further includes that the sending end encrypts the data to be sent, sends the decrypted secret key to the confirmation chain, and sends the extraction position of the secret key to the receiving end;

[0044] The right confirmation chain is an independent block chain.

[0045] As an embodiment of the present invention, the method further includes: when the receiving end extracts the secret key from the right confirmation chain, confirming the right of the receiving end according to the DNA characteristics of the receiving end, and the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data network transmission security protection method based on DNA features and a block chain and a computer readable storage medium, a sending end is responsible for initiating a data sending and receiving request, and the method comprises the following steps: initiating the data sending request by the sending end, and notifying a receiving end to receive data, namely sending a control command to the receiving end; sending The data to be sent to the storage position which can be extracted by the receiving end by the sending end, and the first path following data for confirming the right of the receiving end are attached, so that when the data are extracted from the storage position by the receiving end, the right of the receiving end is confirmed according to the DNA characteristics of the receiving end, and the data can be extracted only by the receiving end which confirms the right. Compared with the prior art, the security of preventing data from being illegally propagated can be improved.

Description

technical field [0001] The invention relates to the field of data security, in particular to a data network transmission security protection method based on DNA features and blockchain and a computer-readable storage medium. Background technique [0002] Network transmission, that is, communication transmission device, refers to the network carrier and device for information data communication and transmission, such as: communication, transmission soft interface (network interface, IP address), network card and other software and hardware equipment. [0003] As the carrier of information, data is the logical form of information, and the recording, storage and transmission of data is the physical form of information, and the main function of information data is to be used for transmission and dissemination. The development of human information society has brought unprecedented activity and progress. [0004] As we all know, since the informatization and dataization of scienc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 刘云
Owner 播金信息科技(上海)有限公司