Unlock instant, AI-driven research and patent intelligence for your innovation.

Off-line data tamper-proofing system based on hash chain

A hash chain, offline technology, applied in the direction of digital transmission system, transmission system, digital data protection, etc., can solve the problem that the security of the hash chain depends on the one-way hash function and cannot be derived, and achieves low bandwidth requirements, The effect of key management simplicity

Pending Publication Date: 2022-04-05
航天科工智能运筹与信息安全研究院(武汉)有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The security of the hash chain depends on the one-way nature of the one-way hash function, that is, Wn can be derived from Wn-1, but Wn cannot be derived from Wn-1

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Off-line data tamper-proofing system based on hash chain
  • Off-line data tamper-proofing system based on hash chain
  • Off-line data tamper-proofing system based on hash chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0036] Aiming at the problem of anti-tampering of offline data, the invention proposes a safe and reliable off-line data anti-tampering system based on hash chain technology and hybrid encryption mechanism. Among them, the hash chain technology is used to realize the anti-tampering of offline data, and then the hybrid encryption mechanism is used to prevent offline users from deleting the offline hash chain. Some basic concepts related to the present invention are:

[0037] 1. Hash chain: A hash chain is usually defined as the repeated application of an encrypted hash function to a given data asset. The specific implementation of the hash chain is to perform multiple hash operations on the data asset, and the The resu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an off-line data tamper-proofing system based on a hash chain, and belongs to the technical field of detecting off-line data tampering behaviors of off-line users. According to the offline data tampering prevention method and system, the offline data are recorded and traced by using the hash chain technology, a reliable and safe technical scheme is provided for tampering prevention of the offline data, a new application scene is developed for the hash chain technology, and the offline data tampering prevention method and system have important practical application value.

Description

technical field [0001] The invention belongs to the technical field of detecting offline data tampering by offline users, and in particular relates to a hash chain-based offline data tamper-proof system. Background technique [0002] Data sharing service is the bridge and medium to realize the value of scientific data, and a good form of sharing service is a necessary condition for the full play of the value of scientific data. Offline data is an important part of data sharing services. With the continuous development of open science, offline data security sharing becomes more and more important. However, offline data is unique as a digital asset: in the offline mode, users are separated from the online supervision of the data sharing platform, and their usage is not supervised, and data holders can use the data for improper purposes in violation of supervision. usage, seriously restricting the ecological development of data sharing services. Therefore, in order to realize...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/64H04L9/40
Inventor 王成欢孙鑫陈晓东秦天浩黄家辉马小乐黄腾范志超周志昊
Owner 航天科工智能运筹与信息安全研究院(武汉)有限公司