Supercharge Your Innovation With Domain-Expert AI Agents!

A blockchain-based data encryption protection method and system

A data encryption and block chain technology, applied in the field of data processing, can solve the problems of reducing authentication security, easy to be illegally stolen, data abnormality, etc., and achieve the effect of ensuring safety and reliability and improving safety and reliability

Active Publication Date: 2022-07-05
BEIJING ZHONGKE JINCAI TECH
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Since the blockchain was born, its decentralization, immutability, synchronization, and intelligent distributed management are its biggest technical advantages. Its distributed advantages make data tampering impossible. During the authentication communication process of the device, if the encryption instruction is fixed, it will cause the remote attack node to obtain the corresponding encryption instruction, which will reduce the authentication security. Data in is illegally stolen
[0003] In addition, in the blockchain, it is inevitable that there will be some abnormal storage nodes, which will lead to abnormal data stored in it, reduced security and easy to be stolen illegally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A blockchain-based data encryption protection method and system
  • A blockchain-based data encryption protection method and system
  • A blockchain-based data encryption protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] like figure 1 As shown, the present application provides a blockchain-based data encryption and protection method, which includes the following steps:

[0046] Step S1, in response to a request signal from the data uploading terminal to store the data to be encrypted in the blockchain, obtain the security assessment feature data of the data uploading terminal.

[0047] Specifically, the data upload terminal generates the data to be encrypted, packages the to-be-encrypted data to generate a data abstract or file name, and requests the encryption node on the blockchain to upload the data and stores it. After the encryption node of the blockchain receives the request signal to obtain the security assessment feature data of the data upload terminal.

[0048] As a specific embodiment of the present invention, the security assessment feature data of the data upload terminal includes: attribute feature data of the data upload terminal: IP address, MAC address, user name, reques...

Embodiment 2

[0079] like image 3 As shown, the present application also provides a blockchain-based data encryption protection system 100, which includes:

[0080] The data acquisition module 10 is configured to store the data to be encrypted in the storage node of the blockchain in response to the request of the data uploading terminal, and obtain the security assessment feature data of the data uploading terminal;

[0081] The data processor 20 is configured to calculate the safety and reliability value of the data uploading terminal according to the safety evaluation characteristic data of the data uploading terminal;

[0082] The data comparison module 30 is used to compare the safety and reliability value with the preset first threshold value. If the safety and reliability value is greater than the preset first threshold value, upload the to-be-encrypted data of the data uploading terminal to the encryption node of the blockchain 50 , and encrypt the data to be encrypted; otherwise, i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a method and system for data encryption and protection based on blockchain, the method includes: in response to a request signal from a data upload terminal to store the data to be encrypted in the blockchain, obtaining security assessment feature data of the data upload terminal; The security assessment feature data of the data upload terminal is calculated, and the security and reliability value of the data upload terminal is calculated; the size of the security and reliability value and the preset first threshold value are compared, and if the security and reliability value is greater than the preset first threshold value, the data upload terminal to be encrypted Upload the data to the encryption node of the blockchain, and encrypt the data to be encrypted; otherwise, it is forbidden to upload the data to be encrypted in the data upload terminal to the blockchain; upload the encrypted ciphertext to the storage of the blockchain node. This application prevents data uploading terminals with low security and reliability from encrypting and storing data on the blockchain, preventing storage nodes with abnormal storage performance from storing data or data being stolen by illegal requesting terminals, and improving the security and reliability of data in blockchain storage nodes. .

Description

technical field [0001] The present application relates to the technical field of data processing, and in particular, to a method and system for data encryption and protection based on blockchain. Background technique [0002] Since the emergence of blockchain, its decentralization, immutability, synchronization, and intelligent distributed management are its biggest technical advantages, and its distributed advantages make data tampering impossible. During the authentication and communication process of the device, if the encryption command is fixed, it will cause the remote attack node to obtain the corresponding encryption command, which will reduce the authentication security. The data in it has been illegally stolen. [0003] In addition, in the blockchain, it is inevitable that some abnormal storage nodes will appear, which will lead to abnormal data storage, reduced security and easy to be illegally stolen. [0004] Therefore, how to evaluate the security performance...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/1097H04L67/1008H04L67/1023G06F16/27G06F21/60G06F21/62
CPCH04L63/0428H04L63/126H04L67/1097H04L67/1008H04L67/1023G06F21/602G06F21/6218G06F16/27
Inventor 王姣杰
Owner BEIJING ZHONGKE JINCAI TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More