Encrypted smart contract privacy protection method based on trusted execution environment
A smart contract and execution environment technology, applied in digital data protection, secure communication devices, instruments, etc., can solve problems such as high communication overhead, identity confirmation, and inability to protect the privacy of smart contract code, and achieve the effect of ensuring safe execution
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0035] Embodiment 1: A smart contract privacy protection method based on trusted execution environment and encryption, the method includes three nodes: user node, computing node and certification center, two steps: contract deployment and contract call, as follows:
[0036] Three kinds of nodes:
[0037] 1) User node, user_node: A node that can initiate a request to a computing node, and the request includes contract deployment and contract invocation;
[0038] 2) Compute node, compute_node: a node that carries TEE and can execute smart contract bytecode in TEE;
[0039] 3) Certification center, certificate_authority: a node containing all legal TEE information, which can be used to verify whether the TEE carried by the node is legal;
[0040] Two steps:
[0041] Step1 contract deployment: the user node user_node uses the legal computing node table legal_table provided by the certification center certificate_authority to select a computing node compute_node that carries a le...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com