Blockchain uploading method for preventing data tampering

A data tampering and blockchain technology, applied in the blockchain field, can solve problems such as malicious modification of data, and achieve the effect of meeting business needs, ensuring integrity and encryption

Active Publication Date: 2021-08-31
厦门致联科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Blockchain technology can only guarantee that the data cannot be tampered with after it is uploaded to the chain, but the authenticity of the data before it is uploaded to the chain does not belong to the scope of the blockchain capability, and there is still a risk of malicious modification of the data before it is uploaded to other business platforms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain uploading method for preventing data tampering

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0023] like figure 1 , The block chain winding method of preventing data tampering, the method implemented by the hardware chain, said chain comprising a housing system hardware, CPU, Internet access module, data acquisition hardware interfaces, a near field communication module, the SAM the security module, the special data area A DT And hardware tamper module housing, the method includes the following steps:

[0024] Sl, chain systems and the hardware block chain mutual authentication node identification, authentication initialization is completed; the upper strand is connected by a hardware system with block chain 4G node. The near field communication module NFC, Bluetooth, Zigbee, one kind of 433M or 2.5G.

[0025] The process is as follows: on each of the chain block is assigned a unique hardware serial number block chain link ID is the serial number from the ID block chains 8-byte random number ID RQ +16 bytes directly fixed ID value CQ Composition prior to complete the init...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data tampering prevention blockchain uplink method, and the method comprises the following steps that S1, an uplink hardware system and a blockchain node carry out identity mutual verification, and initialized identity authentication is completed; S2, the uplink hardware system obtains the key data from the service equipment through the data acquisition hardware interface, and performs identity signature and encryption on the key data; S3, the uplink hardware system obtains the associated data from the communication device through the near field communication module, and performs identity signature and encryption on the associated data; S4, the uplink hardware system packages the key data and the associated data, performs identity signature and encryption on the packaged data, and sends the packaged data to the block chain node to complete data uplink. According to the method disclosed by the invention, the key data is ensured to pass through the verification and protection mechanism of the uplink hardware system before being uplink, and is directly uplink on the block chain node, so that the risk that the data is maliciously modified before being uplink through other service platforms is avoided, and the integrity and encryption of the uplink data are ensured.

Description

Technical field [0001] The present invention relates to block chain technology, and particularly relates to a method of block chains on the chain data tampering prevention. Background technique [0002] Block chain is a distributed data storage, new applications of computer technology point to point transmission mode, the consensus mechanism, encryption algorithm, which is essentially a decentralized database. After the block chain technology can only guarantee that the data link, the data can not be altered, but the authenticity of the data in front of the chain, is outside the scope of the block chain capabilities, data is still at risk of being maliciously modified chain before on other business platforms . Inventive content [0003] To solve the above problems, the present invention provides a method of strand chain block data tampering prevention. [0004] The present invention adopts the following technical solutions: [0005] Chain block chain A method of preventing the f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45G06F21/60G06F21/64G06Q20/38G06Q20/40
CPCG06F21/45G06F21/602G06F21/64G06Q20/3825G06Q20/3829G06Q20/4014
Inventor 杨凯林滨杨顺福赖作砰
Owner 厦门致联科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products