Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Blockchain-based data encryption working method

A technology of data encryption and working methods, applied in digital data protection, electronic digital data processing, structured data retrieval, etc., can solve the problems of inability to identify, reduce authentication security, etc., achieve high use value and increase information security , improve the matching effect

Inactive Publication Date: 2021-07-30
王仁义
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Since the blockchain was born, its decentralization, immutability, synchronization, and intelligent distributed management are its biggest technical advantages. Its distributed advantages make data tampering impossible. During the authentication communication process of the device, if the encryption command is fixed, it will cause the remote attack node to obtain the corresponding encryption command, which will reduce the security of the authentication. The existing technology cannot perform identity recognition or pre-authentication matching process during the authentication process, which is urgently needed. Field technicians solve corresponding technical problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain-based data encryption working method
  • Blockchain-based data encryption working method
  • Blockchain-based data encryption working method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0032] like Figures 1 to 4 As shown, the working method of the present invention includes the following steps: S1, establishing an encrypted channel for each node in the blockchain network, setting a first information exchange terminal and a second information exchange terminal for each encrypted channel, and the first information exchange The terminal is used to distribute instructions to the encrypted information, and the second information interaction terminal is used to receive the encrypted information and record the random number ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a blockchain-based data encryption working method, including: S1, establishing an encryption channel for each node in the blockchain network, and setting a first information interaction terminal and a second information interaction terminal for each encryption channel terminal, the first information interaction terminal is used to distribute instructions to encrypted information, and the second information interaction terminal is used to receive encrypted information and record the random number containing specific identification information in encrypted information; S2, the first information exchange terminal after passing the encrypted information authentication The second information interaction terminal opens the encryption channel, performs data call and data mining, S3, after encrypting the output, selects random numbers to update the encryption parameters through switching authentication, and forwards the information received by the second information interaction terminal to the smart terminal, through the hash operation Generate local parameters for the smart terminal master key, use the master key identity parameters to update the authentication key KEY, and encrypt and encapsulate the key.

Description

technical field [0001] The invention relates to the field of blockchain encryption, in particular to a blockchain-based data encryption working method. Background technique [0002] Since the blockchain was born, its decentralization, immutability, synchronization, and intelligent distributed management are its biggest technical advantages. Its distributed advantages make data tampering impossible. During the authentication communication process of the device, if the encryption command is fixed, it will cause the remote attack node to obtain the corresponding encryption command, which will reduce the security of the authentication. The existing technology cannot perform identity recognition or pre-authentication matching process during the authentication process, which is urgently needed. Technical personnel in the field solve corresponding technical problems. Contents of the invention [0003] The present invention aims at at least solving the technical problems existing...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/64G06F16/27
CPCG06F21/602G06F21/6227G06F21/64G06F16/27
Inventor 王仁义张作功贾俊国郭付国
Owner 王仁义
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products