Unlock instant, AI-driven research and patent intelligence for your innovation.

Block chain data encryption method and device and storage medium

A technology of data encryption and blockchain, which is applied in digital transmission system and key distribution, can solve the problems of data key destruction, endangering encrypted data, slow encryption and decryption speed, etc., and achieve high-efficiency time-sharing multiplexing function, Ultra-fast data transfer performance, enhanced security effects

Pending Publication Date: 2021-10-01
XIAMEN TANHONG INFORMATION TECH CO LTD
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Improper key storage can compromise all encrypted data; access to key storage must be restricted to specific entities requiring individual keys, and policies are required to manage key storage, using role separation to facilitate access Control: the entity using a given key cannot be the entity storing that key; finally, key backup and recovery, loss of keys undoubtedly means loss of data protected by those keys
While this is an effective process for destroying data, the accidental loss of keys protecting mission-critical data can destroy a business, so a secure backup and recovery solution must be implemented. These are the security issues and solutions in a cloud environment. , but there is no "completely secure" solution on the market
[0003] When blockchain technology involves data encryption, private key encryption, etc., it is often implemented by combining symmetric encryption and asymmetric encryption, especially the hash algorithm, which is also to ensure that blockchain data cannot be tampered with. One of the core technologies, but a big problem with the hash encryption algorithm is that the encryption and decryption speeds are slow and take a long time; in addition, due to the different selection of consensus algorithms, if you choose the POW algorithm, it requires high computing power. And the consensus process takes a long time, which eventually leads to a longer time to form a block, especially when the data on the chain is large and the application that requires throughput, this problem will be more prominent; this is also a limitation One of the factors for the promotion and application of blockchain technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain data encryption method and device and storage medium
  • Block chain data encryption method and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] This embodiment provides a block chain data encryption method, such as figure 2 As shown, it includes: using a quantum encryption protocol to encrypt blockchain data to generate a quantum key; wherein at least one node in the blockchain is a quantum computer.

[0027] The quantum computer is an important component of the quantum security communication network, which realizes the physical switching of the optical signal transmission link, completes the cross-connection of the optical fiber quantum channel link, and realizes the networking of quantum key generation equipment and efficient time-sharing multiplexing functions. Optical quantum switch is a kind of quantum computer, with ultra-low access loss, ensuring that the rate of key generation will not be disturbed; fast switching speed, reducing system chain establishment time, and improving user experience; highly integrated software, hardness and structure design.

[0028] The blockchain consists of several nodes. ...

Embodiment 2

[0046] This embodiment provides a block chain data encryption device, the device includes: one or more processors; memory, used to store one or more programs, when the one or more programs are used by the one or more When executed by multiple processors, the one or more processors are made to perform the method as described above.

[0047] In addition, this embodiment provides a storage medium storing a computer program, and when the program is executed by a processor, the method described in Embodiment 1 above is realized.

[0048] figure 1 It is a schematic structural diagram of a device provided by an embodiment of the present invention.

[0049] Such as figure 1 Shown, as another aspect, the present application also provides a device, including one or more central processing units (CPU) 501, which can be stored in the read-only memory (ROM) 502 according to the program or from the storage part 508 Various appropriate actions and processes are executed by a program loade...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a block chain data encryption method and device and a storage medium, and belongs to the technical field of block chain data encryption. The method includes the following steps: encrypting block chain data by using a quantum encryption protocol to generate a quantum key, wherein at least one node in the block chain is a quantum computer. The problem of block chain data storage security can be completely solved, and the throughput can be improved at the same time.

Description

technical field [0001] The present invention relates to the technical field of block chain data encryption, in particular to a block chain data encryption method, device and storage medium. Background technique [0002] Existing cloud service providers can provide basic encryption key schemes to protect cloud-based application development and services, or they leave these protections up to cloud subscribers. While cloud service providers offer developments that support robust key management, more work needs to be done to overcome barriers to adoption of key management technologies; key storage must be protected like other sensitive data. It must be protected in storage, transmission and backup. Improper key storage can compromise all encrypted data; access to key storage must be restricted to specific entities requiring individual keys, and policies are required to manage key storage, using role separation to facilitate access Control: The entity using a given key cannot b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0852H04L9/3297
Inventor 江漫滔古莹莹
Owner XIAMEN TANHONG INFORMATION TECH CO LTD