Systems and methods for blockchain-based secure storage
A secure storage and blockchain technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as no data owner provides
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0015] Embodiments disclosed herein relate to systems and methods for secure storage based on block chains.
[0016] As used herein, the term "block chain" and "block chain technology" include techniques such as distributed classification, which produces non-variable and data storage that can be verified by password. Examples include a detrimentary platform, such as a platform based on Ethereum. Classification accounts can be public, private or mixed.
[0017] Embodiments use block-based techniques to provide data invariance, data elasticity, and decentralization (ie, without a central authority) to implement this. Although some functions can be implemented using traditional architecture and software, the block chain-based technique is provided by ensuring that data integrity and invariance provide data owners to manage their data in decentralization, without central domain management. The ability to manage and increase value.
[0018] Embodiments relate to a block-based security ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

