CN111460468A - Block chain encryption and decryption method and system based on fault-tolerant mechanism - Google Patents
Block chain encryption and decryption method and system based on fault-tolerant mechanism Download PDFInfo
- Publication number
- CN111460468A CN111460468A CN202010125796.9A CN202010125796A CN111460468A CN 111460468 A CN111460468 A CN 111460468A CN 202010125796 A CN202010125796 A CN 202010125796A CN 111460468 A CN111460468 A CN 111460468A
- Authority
- CN
- China
- Prior art keywords
- module
- encryption
- verification
- decryption
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 21
- 238000012795 verification Methods 0.000 claims abstract description 58
- 238000004364 calculation method Methods 0.000 claims abstract description 20
- 238000012544 monitoring process Methods 0.000 description 3
- 238000013500 data storage Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1479—Generic software techniques for error detection or fault masking
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Quality & Reliability (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a block chain encryption and decryption method and system based on a fault-tolerant mechanism, which comprises a user system, wherein the user system is connected with an operating system, the operating system is connected with a processing system, the processing system is connected with a public system, the user system is connected with the processing system and the public system in parallel, the operating system comprises an acquisition module, an encryption module, a decryption module and a display module, the acquisition module is connected with the encryption module in series, the decryption module is connected with the display module in series, the processing system comprises a calculation module, a verification module and a cache module, the calculation module is connected with the verification module in series, the verification module is connected with the cache module in series, the public system comprises a block chain and storage nodes, the block chain generates storage nodes, the fault tolerance is effectively improved, and the reading safety of supervisory data is facilitated, and the stability of data use is ensured.
Description
Technical Field
The invention relates to the field of encryption and decryption technology, in particular to a block chain encryption and decryption method and system based on a fault-tolerant mechanism.
Background
In the current social life, the importance of information is more and more prominent, and the security storage and reading of information are more and more important, so that the encryption protection is needed, and the monitoring management is needed when the decryption is read.
However, most of the existing data storage modes are that the storage module is directly used for storage, all data can be protected only by means of hardware encryption, so that the security is low, reading and error verification of different data cannot be monitored, the data security is not protected, and the use effect is influenced
Disclosure of Invention
The invention aims to solve the defects in the prior art and provides a block chain encryption and decryption method and system based on a fault-tolerant mechanism.
In order to achieve the purpose, the invention adopts the following technical scheme:
the utility model provides a block chain encryption and decryption method and system based on fault-tolerant mechanism, includes user system, user system is connected with operating system, operating system is connected with processing system, processing system is connected with public system, user system parallel connection is in processing system and public system, operating system includes collection module, encryption module, decryption module and display module, collection module serial connection is in encryption module, decryption module serial connection is in display module, processing system includes calculation module, verification module and cache module, calculation module serial connection is in verification module, verification module serial connection is in cache module, public system includes block chain and storage node, the block chain generates there is storage node.
Preferably, the display module is connected with a storage module in series, and the storage module is connected with the cache module in parallel.
Preferably, the encryption module and the decryption module are connected to the processing system in parallel, and the encryption module and the decryption module are connected to the computing module in parallel.
Preferably, the computing modules are connected in series to a common system, and the computing modules are connected in series to a block chain.
Preferably, the verification modules are connected in parallel to a common system, and the verification modules are connected in parallel to the storage nodes.
Preferably, the encryption and decryption method includes the following steps:
p1, uploading data by a user system, and acquiring the data by an acquisition module to form a data block;
p2, the encryption module encrypts the data block to form a private key to be fed back to the user system, and transmits the encrypted data and the private key to the processing system;
the P3 calculation module receives the encrypted data and the private key, calculates the data length of the encrypted data, forms a verification contract by combining the private key and transmits the verification contract together with the encrypted data to the public system;
p4, receiving the encrypted data and the verification contract by the block link to generate a storage node for storing the data;
p5, the user system reads data through the processing system and uses private key to verify and log in;
p6, a verification module of the processing system receives the private key for verification and generates a verification code;
p7, if the verification fails, transmitting the verification code to the cache module for the next verification, and transmitting the first verification code to the storage module for fault-tolerant storage;
p8, if the verification is passed, directly connecting the storage node, reading the stored encrypted data, and performing matching calculation through a calculation module to generate a read data block;
and the P9 decryption module decrypts the read data block and transmits the decrypted data block to the display module for data display.
Preferably, the encrypted data and the private key of the step P2 adopt uniform prefix numbering, and the numbering rule is time-data type-times.
Preferably, the verification code and the private key of the step P6 adopt uniform prefix numbers, and display time nodes and mask data types and times.
Preferably, the fault tolerant storage of step P7 stores different authentication times for the same user system in the same folder.
According to the block chain encryption and decryption method and system based on the fault-tolerant mechanism, the user system is connected with the operating system, the processing system and the public system, different data can be encrypted and processed respectively, meanwhile, the block chain is adopted for partitioned storage, different data can be encrypted and stored singly, the data safety is effectively guaranteed, the fault tolerance is effectively improved by storing and monitoring the times and time of error verification, the data reading safety is favorably supervised, and the stability of data use is guaranteed.
Drawings
FIG. 1 is a schematic block diagram of the system of the present invention.
In the figure: 1 user system, 2 operating systems, 21 acquisition module, 22 encryption module, 23 decryption module, 24 display module, 3 processing system, 31 calculation module, 32 verification module, 33 cache module, 34 storage module, 4 public system, 41 block chain and 42 storage node
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to the following embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
A block chain encryption and decryption method and system based on fault-tolerant mechanism comprises a user system 1, wherein the user system 1 is connected with an operating system 2, a processing system 3 is connected with the operating system 2, a public system 4 is connected with the processing system 3, the user system 1 is connected with the processing system 3 and the public system 4 in parallel, the operating system 2 comprises an acquisition module 21, an encryption module 22, a decryption module 23 and a display module 24, the acquisition module 21 is serially connected to the encryption module 22, the decryption module 23 is serially connected to the display module 24, the processing system 3 comprises a calculation module 31, a verification module 32 and a cache module 33, the calculation module 31 being connected in series to the verification module 32, the verification module 32 is serially connected to the cache module 33, the public system 4 includes a block chain 41 and a storage node 42, and the storage node 42 is generated by the block chain 41.
Preferably, the display module 24 is serially connected to a storage module 34, and the storage module 34 is connected to the buffer module 33 in parallel.
Preferably, the encryption module 22 and the decryption module 23 are connected in parallel to the processing system 3, and the encryption module 22 and the decryption module 23 are connected in parallel to the calculation module 31.
Preferably, the computing modules 31 are connected in series to the common system 4, and the computing modules 31 are connected in series to the block chain 41.
Preferably, the verification modules 32 are connected in parallel to the common system 4, and the verification modules 32 are connected in parallel to the storage nodes 42.
Preferably, the encryption and decryption method includes the following steps:
p1, uploading data by a user system, and acquiring the data by an acquisition module to form a data block;
p2, the encryption module encrypts the data block to form a private key to be fed back to the user system, and transmits the encrypted data and the private key to the processing system;
the P3 calculation module receives the encrypted data and the private key, calculates the data length of the encrypted data, forms a verification contract by combining the private key and transmits the verification contract together with the encrypted data to the public system;
p4, receiving the encrypted data and the verification contract by the block link to generate a storage node for storing the data;
p5, the user system reads data through the processing system and uses private key to verify and log in;
p6, a verification module of the processing system receives the private key for verification and generates a verification code;
p7, if the verification fails, transmitting the verification code to the cache module for the next verification, and transmitting the first verification code to the storage module for fault-tolerant storage;
p8, if the verification is passed, directly connecting the storage node, reading the stored encrypted data, and performing matching calculation through a calculation module to generate a read data block;
and the P9 decryption module decrypts the read data block and transmits the decrypted data block to the display module for data display.
Preferably, the encrypted data and the private key of the step P2 adopt uniform prefix numbering, and the numbering rule is time-data type-times.
Preferably, the verification code and the private key of the step P6 adopt a uniform prefix number, and display time nodes, and mask data types and times.
Preferably, the fault tolerant storage of step P7 stores different authentication times for the same user system in the same folder.
According to the block chain encryption and decryption method and system based on the fault-tolerant mechanism, the user system is connected with the operating system, the processing system and the public system, different data can be encrypted and processed respectively, meanwhile, the block chain is adopted for partitioned storage, different data can be encrypted and stored singly, the data safety is effectively guaranteed, the fault tolerance is effectively improved by storing and monitoring the times and time of error verification, the data reading safety is favorably supervised, and the stability of data use is guaranteed.
Claims (9)
1. A block chain encryption and decryption method and system based on fault-tolerant mechanism comprises a user system (1), and is characterized in that: the system comprises a user system (1), a processing system (3), a public system (4), an acquisition module (21), an encryption module (22), a decryption module (23) and a display module (24), wherein the user system (1) is connected with the operating system (2), the processing system (3) is connected with the public system (4), the user system (1) is connected with the processing system (3) and the public system (4) in parallel, the operating system (2) comprises the acquisition module (21), the encryption module (22), the decryption module (23) and the display module (24), the acquisition module (21) is connected with the encryption module (22) in series, the decryption module (23) is connected with the display module (24) in series, the processing system (3) comprises a calculation module (31), a verification module (32) and a cache module (33), the calculation module (31) is connected with the verification module (32) in series, the verification module (32) is connected with the cache module (33, the block chain (41) is generated with storage nodes (42).
2. The method and system for encryption and decryption of a blockchain based on a fault tolerant mechanism according to claim 1, wherein: the display module (24) is connected with a storage module (34) in series, and the storage module (34) is connected with the cache module (33) in parallel.
3. The method and system for encryption and decryption of a blockchain based on a fault tolerant mechanism according to claim 1, wherein: the encryption module (22) and the decryption module (23) are connected in parallel to the processing system (3), and the encryption module (22) and the decryption module (23) are connected in parallel to the calculation module (31).
4. The method and system for encryption and decryption of a blockchain based on a fault tolerant mechanism according to claim 1, wherein: the computation modules (31) are connected in series to a common system (4), the computation modules (31) being connected in series to a block chain (41).
5. The method and system for encryption and decryption of a blockchain based on a fault tolerant mechanism according to claim 1, wherein: the verification modules (32) are connected in parallel to a common system (4), the verification modules (32) being connected in parallel to storage nodes (42).
6. The method and system for encryption and decryption of a blockchain based on a fault tolerant mechanism according to claim 1, wherein: the encryption and decryption method comprises the following steps:
p1, uploading data by a user system, and acquiring the data by an acquisition module to form a data block;
p2, the encryption module encrypts the data block to form a private key to be fed back to the user system, and transmits the encrypted data and the private key to the processing system;
the P3 calculation module receives the encrypted data and the private key, calculates the data length of the encrypted data, forms a verification contract by combining the private key and transmits the verification contract together with the encrypted data to the public system;
p4, receiving the encrypted data and the verification contract by the block link to generate a storage node for storing the data;
p5, the user system reads data through the processing system and uses private key to verify and log in;
p6, a verification module of the processing system receives the private key for verification and generates a verification code;
p7, if the verification fails, transmitting the verification code to the cache module for the next verification, and transmitting the first verification code to the storage module for fault-tolerant storage;
p8, if the verification is passed, directly connecting the storage node, reading the stored encrypted data, and performing matching calculation through a calculation module to generate a read data block;
and the P9 decryption module decrypts the read data block, transmits the decrypted data block to the display module for data display, and stores the correct reading times and time in the storage module.
7. The method and system for encryption and decryption of block chains based on fault tolerant mechanism according to claim 6, wherein: the encrypted data and the private key in the step P2 adopt uniform prefix numbering, and the numbering rule is time-data type-times.
8. The method and system for encryption and decryption of block chains based on fault tolerant mechanism according to claim 6, wherein: the verification code and the private key of the step P6 adopt uniform prefix numbers, time nodes are displayed, and data types and times are shielded.
9. The method and system for encryption and decryption of block chains based on fault tolerant mechanism according to claim 6, wherein: the fault tolerant storage of the P7 step stores different authentication times for the same user system in the same folder.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010125796.9A CN111460468A (en) | 2020-02-27 | 2020-02-27 | Block chain encryption and decryption method and system based on fault-tolerant mechanism |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010125796.9A CN111460468A (en) | 2020-02-27 | 2020-02-27 | Block chain encryption and decryption method and system based on fault-tolerant mechanism |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111460468A true CN111460468A (en) | 2020-07-28 |
Family
ID=71684186
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010125796.9A Pending CN111460468A (en) | 2020-02-27 | 2020-02-27 | Block chain encryption and decryption method and system based on fault-tolerant mechanism |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111460468A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107483446A (en) * | 2017-08-23 | 2017-12-15 | 上海点融信息科技有限责任公司 | Encryption method, equipment and system for block chain |
CN108809652A (en) * | 2018-05-21 | 2018-11-13 | 安徽航天信息有限公司 | A kind of block chain encryption account book based on privacy sharing |
CN108848111A (en) * | 2018-08-06 | 2018-11-20 | 杭州云象网络技术有限公司 | A kind of decentralization Virtual Private Network construction method based on block chain technology |
KR20190063796A (en) * | 2017-11-30 | 2019-06-10 | 주식회사 베프스 | Identification apparatus and method based on biometric data for blockchain system |
-
2020
- 2020-02-27 CN CN202010125796.9A patent/CN111460468A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107483446A (en) * | 2017-08-23 | 2017-12-15 | 上海点融信息科技有限责任公司 | Encryption method, equipment and system for block chain |
KR20190063796A (en) * | 2017-11-30 | 2019-06-10 | 주식회사 베프스 | Identification apparatus and method based on biometric data for blockchain system |
CN108809652A (en) * | 2018-05-21 | 2018-11-13 | 安徽航天信息有限公司 | A kind of block chain encryption account book based on privacy sharing |
CN108848111A (en) * | 2018-08-06 | 2018-11-20 | 杭州云象网络技术有限公司 | A kind of decentralization Virtual Private Network construction method based on block chain technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liang et al. | Secure data storage and recovery in industrial blockchain network environments | |
EP3443710B1 (en) | Cryptologic rewritable blockchain | |
CN102841998B (en) | Stored data integrity protection method of memory addition validator | |
CN111095218B (en) | Method, system and device for storing shared block chain data based on error correction coding | |
CN110457929B (en) | Method and system for sharing heterogeneous HIS (high-speed multimedia subsystem) big data real-time encryption and decryption compressed uplink | |
CN111984726A (en) | Storage and distributed database of measurement data sets | |
CN116887073A (en) | Electric energy meter data acquisition control system based on computer network communication | |
CN112907375A (en) | Data processing method, data processing device, computer equipment and storage medium | |
CN105678190A (en) | Data storage auditing system | |
CN111460468A (en) | Block chain encryption and decryption method and system based on fault-tolerant mechanism | |
CN115589298A (en) | Method, device, system, equipment and medium for verifying information of block chain | |
CN111740817A (en) | Code tampering detection method and system for concentrator in electric power data acquisition system | |
CN117971962A (en) | Block chain-based carbon tag data monitoring method | |
CN117857060B (en) | Two-dimensional code offline verification method, system and storage medium | |
CN115632793A (en) | Equipment maintenance data processing method based on block chain characteristics | |
CN117540436A (en) | Log file processing method, device, equipment and storage medium | |
CN117640150A (en) | Terminal authentication method, carbon emission supervision integrated platform and terminal authentication device | |
CN117914462A (en) | Data flow mapping method and device based on block chain technology | |
CN117391862A (en) | Asset data management system with tamper resistance, method and computer storage medium | |
Tu et al. | Summary of Data Storage Technology in Cloud Storage Service | |
CN114693176A (en) | Entrepreneurship project credit investigation method on crowd-sourced block chain platform | |
CN113849385A (en) | Log file generation and analysis method and device | |
CN116032481A (en) | Load prediction safety interaction method based on identity cryptosystem signature algorithm | |
CN117857060A (en) | Two-dimensional code offline verification method, system and storage medium | |
Feng et al. | Robust Provable Data Possession Protocol |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200728 |