Unlock instant, AI-driven research and patent intelligence for your innovation.

Data communication flow shielding method based on block chain

A data communication and block chain technology, applied in electrical components, transmission systems, etc., can solve problems such as obvious traffic characteristics and interrupted connections, and achieve good concealment, fast transmission speed, and good real-time performance

Pending Publication Date: 2020-11-17
安徽高山科技有限公司
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This solution has relatively high transmission efficiency through the server proxy, but the traffic characteristics are relatively obvious, and there is a risk that the connection will be interrupted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data communication flow shielding method based on block chain
  • Data communication flow shielding method based on block chain
  • Data communication flow shielding method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. The embodiments of the present invention have been presented for purposes of illustration and description, but are not intended to be exhaustive or to limit the invention to the form disclosed. Many modifications and changes will be apparent to those of ordinary skill in the art. The embodiment was chosen and described in order to better explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention and design various embodiments with various modifications as are suited to the particular use.

[0015] A block chain-based data communication flow protection method uses nodes in the block chain network as carriers to simulate actual data flow as node flow data transmission.

[0016] combine figure 1 Describe the traffic masking process, where nodes C, D...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data communication flow shielding method based on a block chain, which comprises the following steps of: simulating actual data flow into node flow data transmission by taking a node in a block chain network as a carrier, disguising the communication requirement of a disguised node as a conventional node communication flow characteristic, and performing data communicationunder flow shielding. The method has the advantages of good hiding performance, good real-time performance, high transmission speed and the like.

Description

technical field [0001] The invention relates to the technical field of traffic protection, in particular to a data communication traffic protection method based on blockchain. Background technique [0002] In some scenarios, there is often a need for data communication between two nodes without being known by a third party. Traditional cryptography methods can only guarantee that communication data will not be intercepted, but cannot guarantee that communication behavior and trajectory will not be captured. [0003] There are three main approaches to deal with this problem in the prior art: [0004] 1. The strategy of using the public platform as a relay to cover communication to a certain extent reduces the possibility of communication behaviors and trajectories being captured, but the attacker can still infer that the network is in the network through long-term and regular big data analysis. Which nodes communicate with each other. In addition, this method lacks suffici...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/168H04L67/10H04L67/104
Inventor 杨宁波杨健
Owner 安徽高山科技有限公司