Light dynamic data integrity auditing method based on hierarchical Merkel hash tree
A Merkel hash, dynamic data technology, applied in the intersection of computer and cryptography, can solve problems such as inapplicable cloud data dynamic integrity audit
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0073] Below in conjunction with specific embodiment, further illustrate the present invention. It should be understood that these examples are only used to illustrate the present invention and are not intended to limit the scope of the present invention. In addition, it should be understood that after reading the teachings of the present invention, those skilled in the art can make various changes or modifications to the present invention, and these equivalent forms also fall within the scope defined by the appended claims of the present application.
[0074] The data integrity audit model in this embodiment specifically includes the following three aspects:
[0075] Power supply company (data owner): After the user's electricity consumption data is collected by the smart meter, it is collected in their respective areas, and all regional data is then centralized to the power supply company. Since the smart meter is an intelligent terminal, the smart meter and the user are re...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com