Supercharge Your Innovation With Domain-Expert AI Agents!

Method and system for preventing back end from tampering uplink data and blockchain network

A block chain and anti-tampering technology, which is applied in digital transmission system, transmission system, user identity/authority verification, etc., can solve the problems of unguaranteed stability and large transformation of the original structure, so as to achieve low transformation cost and prevent tampering effect

Active Publication Date: 2021-07-09
BEIJING ZHONGXIANG BIT TECH
View PDF16 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the transformation process, how to fit the traditional architecture with the blockchain, where the data is uploaded to the chain, and how to upload the chain are difficult points in the transformation. The transformation of the original architecture is too large, and its stability cannot be guaranteed in a short time ; At which stage the data of its own structure is uploaded to the chain, and the blockchain guarantees the security and traceability of the data on the chain, but the data on the chain has been tampered with before it is uploaded to the chain. How to prevent it needs to be paid attention to during the transformation process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for preventing back end from tampering uplink data and blockchain network
  • Method and system for preventing back end from tampering uplink data and blockchain network
  • Method and system for preventing back end from tampering uplink data and blockchain network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] Embodiments of the present invention are described below with reference to the accompanying drawings, so that those skilled in the art can better understand the present invention and implement it, but the enumerated embodiments are not used as a limitation of the present invention. In the case of no conflict, The following embodiments and the technical features in the embodiments can be combined with each other, wherein the same components are denoted by the same reference numerals.

[0016] The method of the present invention mainly solves the problem that the uplink data is tampered with in the transformation of the traditional C / S architecture block chain, that is, after the back end (S end) receives the data D of the front end (C end), it uploads it to Before the blockchain, the data D may be tampered with, and after being on the chain, the blockchain cannot verify whether the data D has been tampered with. The present invention uses a certificate system to protect ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for preventing a back end from tampering uplink data, and the method comprises the following steps that a front end obtains a front-end certificate of the front end from a blockchain, and a corresponding root certificate is stored in the blockchain; the front end uses the front-end certificate to sign data and sends packaged data to the rear end, and the packaged data comprises the front-end certificate, front-end data and a data signature; after receiving the packed data, the rear end constructs a transaction to link the packed data; and the blockchain verifies the front-end certificate in the transaction by using the root certificate, and carries out tamper-proof verification on the packaged data through the smart contract. The invention also correspondingly provides a system for preventing the back end from tampering with the uplink data and a blockchain network. According to the method, the blockchain of the traditional C / S architecture is transformed, the transformation cost is low, and the uplink data is prevented from being tampered.

Description

technical field [0001] The present invention relates to the technical field of blockchain smart contracts, and more specifically, relates to a method, system and blockchain network for preventing the backend from tampering with uplink data. Background technique [0002] With the development of blockchain technology becoming more and more mature, there are more and more usage scenarios, and more traditional industry traditional architectures hope to upgrade and transform the blockchain, using the distributed, decentralized and traceable blockchain technology, Trusted mechanism for storage verification of traditional data. However, in the transformation process, how to fit the traditional architecture with the blockchain, where the data is uploaded to the chain, and how to upload the chain are difficult points in the transformation. The transformation of the original architecture is too large, and its stability cannot be guaranteed in a short time ; At which stage the data of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0823H04L63/123H04L9/3247H04L9/3263H04L9/50
Inventor 刘晨李鑫陈宝辉严挺卢小明
Owner BEIJING ZHONGXIANG BIT TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More