Archive secure storage and sharing system based on hybrid block chain and implementation method
A technology of secure storage and sharing system, applied in the field of archives security storage and sharing system based on hybrid blockchain, it can solve the problems of malicious dissemination of archives, network congestion, and archive information leakage, so as to prevent content from being tampered with and improve the speed. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0068] as attached figure 1 As shown, the file security storage and sharing system based on the hybrid block chain of the present invention, the system includes,
[0069] Storage layer, the storage layer is used to store shared files and protect files from tampering; the storage layer adopts IPFS;
[0070] The sharing layer is used to record the transaction information that occurs, provide proof for the traceability of the file sharing process, and is used to automatically perform identity authentication to ensure the safe sharing of files without the participation of a third party; the sharing layer includes multi-layer blocks Chain model and smart contracts on the blockchain;
[0071] The user layer is used to manage, update, view, and share files; the user layer is composed of participants. Participants include archives management institutions, archives managers, archives owners and archives visitors; among them, the archives management organization manages the archives o...
Embodiment 2
[0080] The implementation method of file security storage and sharing based on hybrid block chain of the present invention, the method is specifically as follows:
[0081] S1. Initialization: Build a multi-layer blockchain model based on Ethereum, initialize a main chain including the participation of leading nodes, and access nodes, group nodes and ordinary nodes to join the main chain through identity authentication;
[0082] S2. Identity registration and authentication: The leader node registers and authenticates the group nodes, access nodes, and ordinary nodes respectively. After the legal node is successfully registered, it obtains the corresponding node id, joins the corresponding chain, and obtains the private node distributed by Ethereum. key and public key; among them, the private key is stored locally;
[0083] S3, file encryption storage: first encrypt the file and then store the file, and double protect the storage of the file;
[0084] S4. File sharing: Access n...
Embodiment 3
[0113] as attached Figure 5 As shown, this embodiment takes the student file scenario as an example, and introduces the entire file sharing process as follows:
[0114] (1) The archives access unit issues an access application;
[0115] (2) Trigger the identity verification smart contract. After the verification is successful, the verification certificate and the access application will trigger the leader node permission smart contract together;
[0116] (3) After the corresponding leader node (school file management office) agrees, call the main file sharing contract to send the access application, verification certificate, and leader permission to the corresponding group node (the department manager corresponding to the student file) ;
[0117] (4) Access application, verification certificate, and leader permission trigger the file sharing smart contract on the sub-chain through the group node, and send the information to the corresponding ordinary node (student whose fil...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com