Information protection method based on cloud computing and blockchain service and artificial intelligence platform

A technology of information protection and artificial intelligence, applied in computing, computer security devices, digital data protection, etc., can solve problems such as inability to realize differentiating credential verification, limited information calling authority, and few two-way rule engines, etc.

Active Publication Date: 2020-12-11
TOP LEARNING BEIJING EDUCATION TECH CO LTD
View PDF15 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, blockchain service terminals that provide blockchain services to users mostly access areas based on a rule engine, but few bidirectional rule engines
For this, it is usually impossible to implement differentiated credential verification. For example, when a blockchain service terminal is connected to two control centers at the same time, the two control centers perform differentiated authority control when accessing a blockchain service terminal at the same time, resulting in information The limitation of call authority is relatively large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information protection method based on cloud computing and blockchain service and artificial intelligence platform
  • Information protection method based on cloud computing and blockchain service and artificial intelligence platform
  • Information protection method based on cloud computing and blockchain service and artificial intelligence platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] In order to more clearly illustrate the technical solutions of the embodiments of the present specification, the following briefly introduces the drawings that need to be used in the description of the embodiments. Apparently, the accompanying drawings in the following description are only some examples or embodiments of this specification, and those skilled in the art can also apply this specification to other similar scenarios. Unless otherwise apparent from context or otherwise indicated, like reference numerals in the figures represent like structures or operations.

[0077] It should be understood that "system", "device", "unit" and / or "module" used in this specification is a method for distinguishing different components, elements, parts, parts or assemblies of different levels. However, the words may be replaced by other expressions if other words can achieve the same purpose.

[0078] As indicated in the specification and claims, the terms "a", "an", "an" and / ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an information protection method based on cloud computing and blockchain service and an artificial intelligence platform, wherein the method comprises the steps: carrying out iterative calibration of a limiting ciphertext generation part for a limiting lock object in limiting and distinguishing configuration result information, and achieving the continuousupdating of a key stream generator of the limiting ciphertext generation part; and fusing a limiting feature vector and a corresponding limiting authority label weight vector to configure a preset encryption network model, so as to enable the configured preset encryption network model to have higher encryption reliability when traversing and encrypting the access port of each limiting condition inthe target limiting condition analysis set, thereby enhancing the restrictive distinguishing configuration effect.

Description

technical field [0001] The present invention relates to the technical field of cloud computing and blockchain services, in particular to an information protection method and an artificial intelligence platform based on cloud computing and blockchain services. Background technique [0002] At present, most of the access areas of blockchain service terminals that provide users with blockchain services are based on a rule engine, but there are few bidirectional rule engines. For this, it is usually impossible to implement differentiated credential verification. For example, when a blockchain service terminal is connected to two control centers at the same time, the two control centers perform differentiated authority control when accessing a blockchain service terminal at the same time, resulting in information Call permissions are more restrictive. [0003] Based on this, the above-mentioned problems can be improved by configuring restriction distinctions. However, the config...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/602G06F21/6218
Inventor 蔡春梅
Owner TOP LEARNING BEIJING EDUCATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products