A tamper-proof method for cloud governance super data based on block chain technology
A block chain and anti-tampering technology, applied in digital data protection, electronic digital data processing, instruments, etc., can solve problems such as tampering or destruction, inability to determine responsibility for illegal and over-limit transportation of vehicles, and inability to determine responsibility for illegal acts. To achieve the effect of recovering precise control, improving utilization rate and ensuring safety
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0046] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.
[0047] like Figure 1 to Figure 4 As shown, a cloud governance super data anti-tampering method based on blockchain technology includes the following steps:
[0048] Step 1. The registration center initializes the system public key and private key (S K , P K ), public and private keys of system users (S id , P id ) and the shared secret key Key of various governance sites (ZS) z-s ;
[0049] Step 2, when the vehicle (V i ) overrun, the overrun control station (ZS) will automa...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


