Distributed account book data tamper-proofing method and system

A tamper-proof and distributed technology, applied in digital data protection, electronic digital data processing, instruments, etc., can solve problems such as service delay, impact on user use, and impact on blockchain transaction service performance, so as to protect data security and resist Effects of Malicious Attacks

Active Publication Date: 2020-02-21
福建福链科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When there is a lot of tampered data, the performance of blockchain transaction services is often affected, service delays occur, and user usage is affected.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed account book data tamper-proofing method and system
  • Distributed account book data tamper-proofing method and system
  • Distributed account book data tamper-proofing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] Please refer to figure 1 as well as figure 2 , Embodiment 1 of the present invention is:

[0061] A method for preventing tampering of distributed ledger data, comprising the steps of:

[0062] S1. The first hardware encryption card randomly obtains the first data segment from the ledger, and sends the first data segment to the second hardware encryption card. Each accounting server deploys a first hardware encryption card. A second hardware encryption card is deployed in the server;

[0063] In this embodiment, step S1 is specifically:

[0064] S11, such as figure 2 As shown, the first address of the first hardware encryption card on the ledger obtains the data of the first length, which is recorded as the first data segment mm(i), mm() is the data segment, and i is the location of the current first hardware encryption card The ordering of accounting servers in all accounting servers, i=1, 2, ... M, M is the number of accounting servers, and a first hardware enc...

Embodiment 2

[0074] Please refer to figure 2 as well as image 3 , the second embodiment of the present invention is:

[0075] An anti-tampering system 1 for distributed ledger data, comprising M accounting servers 2 and N consensus servers 6, each accounting server 2 deploys a first hardware encryption card 3, and each consensus server 6 deploys A second hardware encryption card 7, the first hardware encryption card 3 includes the first memory 5, the first processor 4 and the first computer program that is stored on the first memory 5 and can run on the first processor 4, the first The second hardware encryption card 7 includes a second memory 9, a second processor 8 and a second computer program stored on the second memory 9 and operable on the second processor 8, and the first processor 4 executes the first computer program When the second processor 8 executes the second computer program, the steps in the second embodiment are realized.

[0076] To sum up, the present invention prov...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a distributed account book data tamper-proofing method and system. A first hardware encryption card obtains a first data segment from an account book and transmits the first data segment to a second hardware encryption card, one first hardware encryption card is deployed in each accounting server, and one second hardware encryption card is deplyed in each consensus server;the second hardware encryption card compares all the received first data segments and judges whether all the received first data segments are consistent or not, and if not, an alarm is given out. According to the data tamper-proofing reinforced security scheme based on a hardware encryption card, even if part of the servers are controlled by attackers, due to the fact that consistency check of theaccount book is implemented in the hardware encryption cards, under the condition that an attacker cannot control all the hardware encryption cards on all the server nodes, malicious attack behaviorexposure caused by data security alarm of the scheme cannot be prevented, malicious attacks are effectively resisted, and data security is protected.

Description

technical field [0001] The invention relates to the technical field of block chain applications, in particular to a method and system for preventing tampering of distributed ledger data. Background technique [0002] Consortium chain is a kind of blockchain. The alliance chain is limited to the participation of alliance members, and the read and write permissions on the blockchain and the participation in bookkeeping permissions are formulated according to the alliance rules. The entire network is jointly maintained by member institutions, and network access is generally accessed through the gateway nodes of member institutions, and the consensus process is controlled by pre-selected nodes. Blockchain is essentially a database technology and a distributed shared ledger, a data structure that is sequentially connected from the back to the front by blocks containing transaction information. Consortium chain data is stored in memory in a blockchain-style data structure during...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06F21/60
CPCG06F21/602G06F21/64
Inventor 林伯吹斯雪明
Owner 福建福链科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products