Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Blockchain-based intelligent data rapid encryption transmission system

An encrypted transmission and data encryption technology, applied in the blockchain field, can solve problems such as low speed, being stolen, and existing risks, so as to improve security, reduce risks, and improve the effect of being easily stolen

Active Publication Date: 2021-04-16
南京人生果信息科技有限公司
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Data encryption refers to converting plaintext into ciphertext through encryption algorithms and encryption keys. It is the most reliable way to protect information. It can realize the function of information concealment and protect information security. Data transmission encryption technology The purpose of this method is to encrypt the data flow in transmission and prevent data loss in the storage link. Data encryption technology includes symmetric encryption, but symmetric encryption has the disadvantages of being stolen during the key transfer process and having risks. How to design encryption Keys and rational distribution are crucial. The foundation of the digital construction of university libraries is to digitize high-quality collections. The promotion and application of blockchain technology has obvious roles in the compatibility and professional digital resource construction of university libraries. Practical significance, however, the data transmission of the library needs to be encrypted. Applying encryption technology to the data transmission of the library can ensure that the book information and college student information will not be stolen. After the data is encrypted, the data transmission rate also needs to be increased. Through The unified distribution of keys by blockchain technology can improve the point-to-point transmission (low rate) between the library server and the client

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain-based intelligent data rapid encryption transmission system
  • Blockchain-based intelligent data rapid encryption transmission system
  • Blockchain-based intelligent data rapid encryption transmission system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] Embodiment 1: Randomly set a prime number P=4049, the original element r=3 of the prime number P module, and randomly set a number a=5 for the user terminal 1, through the formula Calculate and obtain the public key X=243 of a book in the library, randomly set a number b=6 for client 2, and use the formula Calculate and obtain the public key Y of another book of the same type = 729, client 1 and client 2 exchange key X and key Y through plaintext, according to the formula Calculate the secret key K of client 1 = 2239, according to the formula Calculate the secret key K'=K=2239 of client 2, even if P, r, X and Y are intercepted by the eavesdropper, it is difficult to deduce a and b mathematically, so the eavesdropper cannot obtain the secret key K and K', send the public key and secret key K to the authenticated user who borrows the corresponding book, the user obtains the book information by entering the key, and the user who borrows the same book at the same time ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a blockchain-based intelligent data rapid encryption transmission system, which comprises a user identity authentication module, a blockchain, a library collection data entry module, a book borrowing information input module, a data encryption module, a book borrowing information classification statistics module, a key sharing module and a data transmission module; key design distribution is carried out on library book resources and user information through the key distribution unit, the current situation that key distribution of a symmetric encryption algorithm is easy to steal and key transmission is not safe is improved, and the security of key distribution is improved by improving the difficulty of calculating discrete logarithms in a finite field; books of the same type borrowed by a user at the same time are counted in the book borrowing information input module, public keys of the books are sent to the corresponding users in a unified mode, secret keys of the same kind of books are designed through the key distribution unit, and the keys are sorted and then sent to the users in a unified mode. Users on the nodes can also transmit data to each other through the blockchain technology, and the data transmission rate is improved.

Description

technical field [0001] The invention relates to the technical field of block chains, in particular to a block chain-based intelligent data fast encrypted transmission system. Background technique [0002] Data encryption refers to converting plaintext into ciphertext through encryption algorithms and encryption keys. It is the most reliable way to protect information. It can realize the function of information concealment and protect information security. Data transmission encryption technology The purpose of this method is to encrypt the data flow in transmission and prevent data loss in the storage link. Data encryption technology includes symmetric encryption, but symmetric encryption has the disadvantages of being stolen during the key transfer process and having risks. How to design encryption Keys and rational distribution are crucial. The foundation of the digital construction of university libraries is to digitize high-quality collections. The promotion and applicati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/31G06F21/64
CPCY02D30/50
Inventor 李威
Owner 南京人生果信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products