Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Blockchain-based trusted hardware and high-performance decentralized anonymous encryption method

An encryption method and decentralized technology, applied in the field of blockchain algorithms, can solve problems such as lack of fault tolerance, and achieve the effects of solving computing power security, preventing dark network transactions, and improving block production efficiency

Active Publication Date: 2022-06-28
北汽蓝谷信息技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The Paxos algorithm is based on the consensus mechanism for electing leaders. Malicious nodes are not allowed during the election process, and there is no fault tolerance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain-based trusted hardware and high-performance decentralized anonymous encryption method
  • Blockchain-based trusted hardware and high-performance decentralized anonymous encryption method
  • Blockchain-based trusted hardware and high-performance decentralized anonymous encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] In order to make the purposes, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only It is a part of the embodiments of the present application, but not all of the embodiments. The components of the embodiments of the present application generally described and illustrated in the drawings herein may be arranged and designed in a variety of different configurations. Thus, the following detailed description of the embodiments of the application provided in the accompanying drawings is not intended to limit the scope of the application as claimed, but is merely representative of selected embodiments of the application. Based on the embodiments of the present application, all other embo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the field of blockchain algorithms, and discloses trusted hardware based on blockchain and a high-performance decentralized anonymous encryption algorithm. The hardware has a built-in intelligent mining chip, and an anonymous encryption algorithm is embedded in the intelligent mining chip. Users can use it as U disk is used; when inserted into the USB3.0 reading interface, the encryption algorithm is executed, and the device is confirmed through the chip at the same time; if the confirmation is successful, the hardware becomes a block node in the public network blockchain, waiting for the synchronization to be completed. After the block data is available, the election calculation is carried out; when the smart mining chip is successfully elected as a miner, it has the power to package the block; the smart mining chip and the encryption algorithm adopt a consensus mechanism to ensure the protection of the identity of the current miner and the next miner. Make miners anonymous in the entire blockchain network. The hardware and algorithm of the present invention can solve the problem of energy consumption of computing power, the problem of uneven network computing power being attacked by the network, the problem of block energy consumption, and the problem of trusted nodes.

Description

technical field [0001] The invention relates to the field of blockchain algorithms, in particular to a blockchain-based trusted hardware and a high-performance decentralized anonymous encryption method. Background technique [0002] In the development of blockchain in recent years, the leading digital currencies such as Bitcoin, Ethereum, Litecoin, etc. bear the brunt, but they all have many similar technologies and commonalities. [0003] 1. Algorithm-based, Bitcoin uses POW (Proof of Work, Proof of Work) as the consensus algorithm, Ethereum uses POS (Proof of Stake, Proof of Share Equity) and POW (Proof of Work, Proof of Work) mixed consensus algorithm , EOS uses DPoS (Delegated Proof of Stake) as the consensus algorithm. [0004] 2. Network communication: It mainly uses the P2P network as the bottom layer. On this basis, Ethereum has developed its own network protocol and implemented it using Kademlia. [0005] 3. Account type: Bitcoin and Litecoin use UTXO as the under...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/38
CPCG06Q20/3829
Inventor 李硕
Owner 北汽蓝谷信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products