Unlock instant, AI-driven research and patent intelligence for your innovation.

Distributed database security authentication method based on block chain technology

A security authentication and database technology, applied in database distribution/replication, digital data protection, electronic digital data processing, etc., can solve problems such as malicious tampering and legal user overreach, to prevent data loss, improve authentication efficiency, and improve utilization. Effect

Pending Publication Date: 2021-07-23
SHENZHEN QIANHAI HUAZHAO NEW ENERGY CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Some illegal users gain access to the ciphertext database through replay attacks, and can use middleware to view, maliciously tamper with and delete data in the ciphertext database, and legitimate users may also perform unauthorized operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed database security authentication method based on block chain technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The technical solution of this patent will be further described in detail below in conjunction with specific embodiments.

[0024] Embodiments of the present patent are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are only used for explaining the patent, and should not be construed as limiting the patent.

[0025] In the description of this patent, it is to be understood that the terms "center", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", The orientation or positional relationship indicated by "top", "bottom", "inner", "outer", etc. is based on the orientation or positional relationship shown in the drawings, and is only for the convenience of describing this patent and simplifying the des...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of databases, and particularly relates to a distributed database security authentication method based on a block chain technology, which comprises an authentication process, and the authentication process comprises a database processing module, a database detection module, a database login module, a security protection module, a network module, a wireless module and a database encryption module. The authentication process comprises the following steps: S1, acquiring database data in a block chain generated by a data node; and adding the data owner, the data user and the data platform into the alliance chain system. The one-time programmable memory is used for storing a decryption key or an authentication key, so that the utilization rate of the one-time programmable memory is improved, an additional circuit is not needed to protect the authentication key when only identity authentication is carried out, the occupation of resources is reduced, and the security protection module can effectively prevent viruses from attacking data. And the safety is effectively improved.

Description

technical field [0001] The invention relates to the technical field of databases, in particular to a distributed database security authentication method based on block chain technology. Background technique [0002] In order to ensure the confidentiality of data in the database and prevent illegal users from maliciously probing, leaking and tampering with private data, it is an effective method to encrypt sensitive data and store it in the database. The advantage of implementing encryption is that it will not increase the burden on the database server , but the encryption function may be limited, and the coupling with the database management system is poor. Therefore, many users use middleware to realize the encryption operation of plaintext data. The middleware system is deployed between the database client and the server, which can flexibly adjust the encryption and decryption algorithm while ensuring data security, without modifying the upper layer application. Achieve l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F16/27
CPCG06F21/602G06F21/6218G06F16/27
Inventor 许良黄宇黄静文高厚臣
Owner SHENZHEN QIANHAI HUAZHAO NEW ENERGY CO LTD