Data security verification method and device based on block chain

A data security and verification device technology, applied in the application of locks, electric locks, building locks, etc., can solve problems such as damage, poor security, and easy to be discovered by others

Active Publication Date: 2020-12-11
深圳市联沃信息科技有限公司
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a data security verification method and device based on blockchain, which aims to improve the existing data security verification equipment with simple structure, and a single verification method is often used in the actual use process, so that It is easy to be cracked during use, and the single security verification method is easy for others to find out. At the same time, the traditional data security verification device is easy to be internally destroyed during use, and the security is poor. The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security verification method and device based on block chain
  • Data security verification method and device based on block chain
  • Data security verification method and device based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments It is some embodiments of the present invention, but not all of them. Based on the implementation manners in the present invention, all other implementation manners obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the implementation manners in the present invention, all other implement...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data security verification device based on a block chain. The device comprises a protection outer box, a positioning mechanism and a memory box. The device is characterized in that the protection outer box comprises a box shell and a sealing door plate, wherein a viewing port is arranged in the front end surface of the box shell; the sealing door plate is arranged in themiddle of the viewing port and is in longitudinal sliding connection with the box shell; and the positioning mechanism comprises a mounting base and a locking mechanism. According to the method and the device, a user can place objects needing to be stored in a box body stably when used, a sealing cover is stably buckled on the box body, and the safety of the objects in the box body is guaranteed;after the user buckles the sealing cover, the mounting base can drive the box body to stably rotate under the drive of a reset spring; and when the sealing cover rotates to the position opposite to the viewing port, the sealing cover stops rotating, and when the user opens the sealing cover, if the mounting base does not rotate, the objects cannot be taken out of the box body.

Description

technical field [0001] The invention relates to the technical field of data security verification equipment, in particular to a blockchain-based data security verification method and device. Background technique [0002] Blockchain is a new application mode of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. Blockchain is essentially a decentralized database, and at the same time, as the underlying technology of Bitcoin, it is a series of The data blocks associated with cryptographic methods, each data block contains a batch of bitcoin network transaction information, which is used to verify the validity of its information and generate the next block. In a narrow sense, the blockchain is A chained data structure that combines data blocks in a sequential manner in chronological order, and a non-tamperable and non-forgeable distributed ledger guaranteed by cryptography. Broadly speaking, blockchai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): E05G1/00E05G1/02E05G1/026E05B65/52E05B49/00E05B15/00
CPCE05G1/00E05G1/02E05G1/026E05B65/0075E05B49/00E05B15/00
Inventor 易程杰
Owner 深圳市联沃信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products