A blockchain network construction system based on customized os
A blockchain, real-time network technology, applied in transmission systems, data exchange networks, digital transmission systems, etc., can solve problems such as encryption, and achieve the effect of improving work efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0076] Such as figure 2 As shown, the node monitoring module is used to monitor the access records of the blockchain access nodes and process the access records of the blockchain access nodes. The specific processing steps are:
[0077] SS1: Obtain the access records of the blockchain access nodes ten days before the current system time, the access records include the number of visits and access time;
[0078] SS2: Accumulate the number of visits of the same blockchain access node to form the visit frequency, and mark it as P1;
[0079] Accumulate the access time of the same blockchain access node to form the total access time, and mark it as PT1;
[0080] SS3: Use the formula Q1=P1×a1+PT1×a2 to obtain the access attraction value Q1 of the blockchain access node; where a1 and a2 are preset proportional coefficients;
[0081] The node monitoring module is used to transmit the access attraction value Q1 of the blockchain access node to the server, and the server is used to re...
Embodiment 2
[0108] Such as image 3As shown, the identity recognition module is used to identify the identity of the user logging into the smart terminal; the identity recognition method is one or more of fingerprint recognition, face recognition, and iris recognition;
[0109] The user sends the file information to the storage module through the smart terminal for storage, and constructs the file information index table through the address encryption module on the blockchain; the address encryption module encrypts the address information after receiving the address information to obtain encrypted ciphertext, and the address The encryption module is used to return the encrypted ciphertext to the chain and store it in the index table; then, when necessary, search the index table on the chain to search for specific file information off the chain;
[0110] The address encryption module encrypts the address information to obtain the specific working steps of the encrypted ciphertext as follow...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


