CN109981584B - Block chain-based distributed social contact method - Google Patents

Block chain-based distributed social contact method Download PDF

Info

Publication number
CN109981584B
CN109981584B CN201910142669.7A CN201910142669A CN109981584B CN 109981584 B CN109981584 B CN 109981584B CN 201910142669 A CN201910142669 A CN 201910142669A CN 109981584 B CN109981584 B CN 109981584B
Authority
CN
China
Prior art keywords
data
users
public key
communication
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910142669.7A
Other languages
Chinese (zh)
Other versions
CN109981584A (en
Inventor
符安文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201910142669.7A priority Critical patent/CN109981584B/en
Publication of CN109981584A publication Critical patent/CN109981584A/en
Application granted granted Critical
Publication of CN109981584B publication Critical patent/CN109981584B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a block chain-based distributed social contact method, which is characterized by comprising the following steps: s1: in the data interaction platform, users carry out asymmetric encryption through public and private keys, each user forms an exclusive address through an encryption algorithm of a public key, data communication is carried out between every two users through the exclusive address, and the users decrypt received data through the private keys; s2: a third party user enters an interactive channel for data communication through an exclusive address, and any user in the interactive channel is used as a communication node; s3: the data interaction platform carries out public key encryption on the communication nodes again, potential demand users enter the communication nodes through public keys formed by decrypting the communication nodes, and then interactive data are decrypted and obtained through private keys; s4: when a new user enters the corresponding node, the step S3 is repeated, and in the interactive channel, the data transmitted between users is transmitted through the ciphertext block.

Description

Block chain-based distributed social contact method
Technical Field
The invention relates to a distributed social contact method, in particular to a block chain-based distributed social contact method.
Background
Blockchains are a point-to-point distributed storage technique, with the most prominent feature being too decentralized. Under the condition of no central server, the normal operation of the block chain is maintained by all nodes on the chain, and each transaction is recorded in the network system. The blockchain allows two users to trade directly without authorization from a trusted third party, and once the trade information is recorded, it is permanently stored and cannot be changed. Attackers must remain very computationally intensive and at least exceed 50% of the node's power, but such attacks are difficult to implement because most nodes are controlled by honest network nodes. The concept of only the address in the blockchain system does not have the concept of identity behind the address, and the controllable anonymity characteristic can ensure privacy and safety of users while users of strange social networks can freely exchange information.
Unfamiliar social networks today manage user data primarily by a centralized operating mechanism. The background system surveys a large amount of user related information, the user provides massive plaintext information for the system, and finally the system collects the information uniformly to form a centralized database. The system utilizes the user information to carry out data mining, collects the personal preference of the user and continuously carries out spam recommendation on the user. And the user data analysis result is used for reselling each operator regardless of the personal privacy security of the user. The user has no way of knowing when and where to collect and sell personal information. Conventionally, the privacy data of users are frequently revealed, and the centralized management system database system is difficult to self-prove and clear in the events.
Disclosure of Invention
The technical problem to be solved by the invention is that the security problem of new user access cannot be guaranteed when data interaction is carried out on a block chain community platform at present, so that the data security of distributed social contact cannot enjoy the characteristics of a block chain, and the information is not protected and exchanged easily.
The invention is realized by the following technical scheme:
a distributed social method based on a block chain is characterized by comprising the following steps: s1: in the data interaction platform, users carry out asymmetric encryption through public and private keys, each user forms an exclusive address through an encryption algorithm of a public key, data communication is carried out between every two users through the exclusive address, and the users decrypt received data through the private keys; s2: a third party user enters an interactive channel for data communication through an exclusive address, and any user in the interactive channel is used as a communication node; s3: the data interaction platform carries out public key encryption on the communication nodes again, potential demand users enter the communication nodes through public keys formed by decrypting the communication nodes, and then interactive data are decrypted and obtained through private keys; s4: when a new user enters the corresponding node, the step S3 is repeated, and in the interactive channel, the data transmitted between users is transmitted through the ciphertext block.
The block chain is a decentralized database, verifies and stores data by using a block chain type data structure, generates and updates data by using a distributed node consensus algorithm, ensures the safety of data transmission and access by using a cryptology mode, programs and operates a brand new distributed infrastructure and a computing mode of data by using an intelligent contract consisting of automatic script codes, and the social interaction of distributed users in the block chain is usually point-to-point data interaction, wherein the users outside the block chain can be effectively protected by the characteristics of the block chain, but the users in the chain, such as the users in the data interaction platform, can easily know the data interacted on the data interaction platform if not encrypted, and can ensure the data privacy in the chain, so that the users can ensure the data interaction in the distributed social platform, social contact can be conveniently carried out, so a social contact method capable of carrying out encryption to ensure data security is needed to solve the problem of the safety of block chain data interaction.
The distributed social method adopted by the application document is mainly characterized in that data encryption is carried out in an asymmetric encryption mode, and the difference from the prior art is that only encryption of a public key and a private key is carried out in the prior art, namely, a public key is used for one private key. However, this method is very convenient in one-to-one, and if one public key and one private key are always used in a plurality of pairs of interactive distributed socializing, the data interaction security can not be guaranteed very safely, so the dynamic public key used in the application document can be used for entering the communication node after the users interact to form the communication node, new users need to enter the communication node, in order to guarantee different data security and information convenience, the encrypted public key can be different public keys, and the same private key can be used for decrypting all data, and the public key can be changed every time a new user needs to enter the communication node, so that each interactive channel in the same communication node can use different public keys to encrypt data, thereby improving the security of data transmission and improving the difficulty of entering different users.
Further, in the step S3, the correspondent node after the public key encryption is performed again, and the private key required for decryption is the initial private key. The initial private key is the initial public key and the corresponding private key, that is, only a unique private key is used in the whole communication node.
Further, the index of the exclusive address is stored in a block chain bottom layer protocol of the data interaction platform, and a user enters the bottom layer protocol through public key decryption, accesses the stored index and enters an interaction channel for data communication. The bottom layer protocol, namely the bottom layer-physical layer in the OSI model of computer network, mainly provides a data path for data end equipment, and the data path may be one physical medium or a plurality of physical media connected together. A complete data transfer, including activating the physical connection, transferring the data, and terminating the physical connection. The activation is to connect two data terminal devices in communication to form a path no matter how much physical media participates.
Furthermore, the block chain bottom layer protocol is a multi-chain multi-account interface, can be simultaneously connected with a plurality of communication nodes and users, and can simultaneously encrypt data which are oppositely transmitted in the interaction channel. In the bottom layer protocol, a multi-chain multi-account interface is adopted, in a common single-chain single account, only one account number is supported to enter a communication node for transmission, all users cannot be on line at the same time, and the mode is eliminated, so that the common multi-chain multi-account interface is adopted, and the users can send and receive data at the same time.
Further, the encryption algorithm adopts RSA-1024 to carry out public key encryption on the exclusive address. RSA, a representative asymmetric encryption technique, is relatively slow in encryption and decryption, and only small blocks of data can be encrypted and decrypted. But the asymmetric characteristic of the public key meets the requirement that the public key can be distributed everywhere, only the public key can decrypt the data encrypted by the private key, and only the private key can decrypt the data encrypted by the public key.
Compared with the prior art, the invention has the following advantages and beneficial effects:
1. according to the distributed social contact method based on the block chain, the safety of data transmitted in the chain can be guaranteed, different users can perform distributed social contact in the block chain, the public key can be replaced when a new user is added, the data interacted by the different users are transmitted by adopting different public keys and are decrypted by using the unique private key, the decryption difficulty of other people in the chain is improved, and the decryption can be conveniently performed by the user;
2. the invention relates to a distributed social contact method based on a block chain, wherein a data interaction platform adopts asymmetric encryption, and compared with symmetric encryption, the asymmetric encryption has better security: the same secret key is used by both communication parties of symmetric encryption, and if the secret key of one party is leaked, the whole communication is cracked. While asymmetric encryption uses a pair of keys, one for encryption and one for decryption, and the public key is public, the keys are self-contained and do not require synchronization of the keys prior to communication as in symmetric encryption.
Drawings
The accompanying drawings, which are included to provide a further understanding of the embodiments of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the principles of the invention. In the drawings:
FIG. 1 is a system block diagram of an embodiment of the method of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to examples and accompanying drawings, and the exemplary embodiments and descriptions thereof are only used for explaining the present invention and are not meant to limit the present invention.
Example one
As shown in fig. 1, the invention relates to a distributed social method based on a block chain, which is characterized in that the method comprises the following steps: s1: in the data interaction platform, users carry out asymmetric encryption through public and private keys, each user forms an exclusive address through an encryption algorithm of a public key, data communication is carried out between every two users through the exclusive address, and the users decrypt received data through the private keys; s2: a third party user enters an interactive channel for data communication through an exclusive address, and any user in the interactive channel is used as a communication node; s3: the data interaction platform carries out public key encryption on the communication nodes again, potential demand users enter the communication nodes through public keys formed by decrypting the communication nodes, and then interactive data are decrypted and obtained through private keys; s4: when a new user enters the corresponding node, the step S3 is repeated, and in the interactive channel, the data transmitted between users is transmitted through the ciphertext block.
The block chain is a decentralized database, verifies and stores data by using a block chain type data structure, generates and updates data by using a distributed node consensus algorithm, ensures the safety of data transmission and access by using a cryptology mode, programs and operates a brand new distributed infrastructure and a computing mode of data by using an intelligent contract consisting of automatic script codes, and the social interaction of distributed users in the block chain is usually point-to-point data interaction, wherein the users outside the block chain can be effectively protected by the characteristics of the block chain, but the users in the chain, such as the users in the data interaction platform, can easily know the data interacted on the data interaction platform if not encrypted, and can ensure the data privacy in the chain, so that the users can ensure the data interaction in the distributed social platform, social contact can be conveniently carried out, so a social contact method capable of carrying out encryption to ensure data security is needed to solve the problem of the safety of block chain data interaction.
The method adopted by the application document comprises the following steps: firstly, selecting a data interaction platform, firstly, mutually performing data interaction between a user A and a user B, wherein the interaction process is that the user A and the user B obtain a group of public keys and private keys through an encryption algorithm of the data interaction platform, the two users perform data transmission through an exclusive address, a data sender sends data through the public keys, the other party decrypts the data through the private keys to obtain data, an index of the exclusive address is stored in a bottom layer protocol, if a new user needs to be added into the constructed communication node, the data interaction platform can generate a new public key to be given to a new user C, the user C sends the data to the user A and the user B through the newly generated public key, but in a communication channel in the communication node, the only private key can decrypt all the data, when each newly entered user enters the communication node, the new public key is generated and given to the newly-entered user, the old user still uses the original public key to encrypt the data, all the public keys can be decrypted by the same private key, so that the newly-entered user in the chain can seamlessly enter a data channel, the influence of the newly-entered user on the data safety can be avoided, the former user can still upload data by the earliest public key, and the potential user can also use the private key to decrypt and interact with each other.
Example two
In this embodiment, optimization is performed on the basis of the first embodiment, and in step S3, the communication node after public key encryption is performed again, and the private key required for decryption is the initial private key. The initial private key is the initial public key and the corresponding private key, that is, only a unique private key is used in the whole communication node. The main advantage of the encryption algorithm is the use of two key values instead of one, one for encrypting messages and one for decrypting messages. These two key values are generated in the same process, called a key pair. The key used to encrypt the message is called the public key and the key used to decrypt the message is called the private key. Messages encrypted with a public key can only be decrypted with its corresponding private key, which is unknown except to the holder, whereas the public key can be sent through an unsecured pipe or published in a directory.
And when the index of the exclusive address is stored in a block chain bottom layer protocol of the data interaction platform, the user enters the bottom layer protocol through public key decryption, accesses the stored index and enters an interaction channel for data communication. The bottom layer protocol, namely the bottom layer-physical layer in the OSI model of computer network, mainly provides a data transmission path for data end equipment, and the data path may be one physical medium or a plurality of physical media connected together. A complete data transfer, including activating the physical connection, transferring the data, and terminating the physical connection. The activation is to connect two data terminal devices in communication to form a path no matter how much physical media participates.
The block chain bottom layer protocol is a multi-chain multi-account interface, can be simultaneously connected with a plurality of communication nodes and users, and can simultaneously encrypt data which are oppositely transmitted in an interaction channel. In the bottom layer protocol, a multi-chain multi-account interface is adopted, in a common single-chain single account, only one account number is supported to enter a communication node for transmission, all users cannot be on line at the same time, and the mode is eliminated, so that the common multi-chain multi-account interface is adopted, and the users can send and receive data at the same time. The encryption algorithm adopts RSA-1024 to carry out public key encryption on the exclusive address. RSA, a representative asymmetric encryption technique, is relatively slow in encryption and decryption, and only small blocks of data can be encrypted and decrypted. But the asymmetric characteristic of the public key meets the requirement that the public key can be distributed everywhere, only the public key can decrypt the data encrypted by the private key, and only the private key can decrypt the data encrypted by the public key.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (1)

1. A blockchain-based distributed social method, the method comprising the steps of:
s1: in the data interaction platform, two users acquire a pair of public key and private key through the data interaction platform, the users form an exclusive address through an encryption algorithm of the public key, the two users carry out data communication through the exclusive address, a data sender sends data through the public key in an encryption mode, and the other party decrypts the received data through the private key;
s2: a new user enters an interactive channel for data communication through the exclusive address, and any user in the interactive channel is used as a communication node;
s3: the data interaction platform generates a new public key to give the new user, the new user encrypts the uploaded data through the new public key and then sends the encrypted data, the new user decrypts the interactive data through a private key to obtain the interactive data, and the private key is the same as the private key in the step S1;
s4: when every new user enters the communication node, the step S3 is repeated, and the data transmitted between the users are transmitted through the ciphertext block in the interactive channel;
the index of the exclusive address is stored in a block chain bottom layer protocol of the data interaction platform, and a user enters the bottom layer protocol through public key decryption, accesses the stored index and enters an interaction channel for data communication; the block chain bottom layer protocol is a multi-chain multi-account interface, can be connected with a plurality of communication nodes and users at the same time, can encrypt data transmitted in opposite directions in an interactive channel at the same time respectively, and the encryption algorithm adopts RSA-1024 to encrypt a public key of an exclusive address.
CN201910142669.7A 2019-02-26 2019-02-26 Block chain-based distributed social contact method Active CN109981584B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910142669.7A CN109981584B (en) 2019-02-26 2019-02-26 Block chain-based distributed social contact method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910142669.7A CN109981584B (en) 2019-02-26 2019-02-26 Block chain-based distributed social contact method

Publications (2)

Publication Number Publication Date
CN109981584A CN109981584A (en) 2019-07-05
CN109981584B true CN109981584B (en) 2021-10-26

Family

ID=67077479

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910142669.7A Active CN109981584B (en) 2019-02-26 2019-02-26 Block chain-based distributed social contact method

Country Status (1)

Country Link
CN (1) CN109981584B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110543488B (en) * 2019-09-11 2022-06-07 深圳市迅雷网络技术有限公司 Verification node updating method, device and equipment
CN112131304B (en) * 2020-02-10 2021-05-04 北京天德科技有限公司 Novel calculation and storage architecture based on block chain technology
CN111523885B (en) * 2020-03-06 2023-08-01 杜晓楠 Encryption multi-account construction method for blockchain wallet, computer readable storage medium and blockchain encryption multi-account wallet
CN111526195A (en) * 2020-04-17 2020-08-11 北斗(天津)科学技术应用研究院(有限合伙) Decentralized information storage node communication network system and method
CN112418853A (en) * 2020-09-22 2021-02-26 上海哔哩哔哩科技有限公司 Transaction data encryption method and device based on block chain
CN113051596A (en) * 2021-04-20 2021-06-29 普华云创科技(北京)有限公司 Block chain and distributed storage based hierarchical encryption method and system
CN114827075A (en) * 2022-04-06 2022-07-29 上海能链众合科技有限公司 Social communication method in meta universe background

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104901968B (en) * 2015-06-10 2018-01-05 华中科技大学 A kind of key management distribution method in safe cloud storage system
CN105337741A (en) * 2015-10-14 2016-02-17 四川省宁潮科技有限公司 Trust device autonomous registering method based on asymmetric algorithm
US20170359318A1 (en) * 2016-06-12 2017-12-14 Apple Inc. Diversification of Public Keys
CN106506505A (en) * 2016-11-15 2017-03-15 深圳银链科技有限公司 A kind of list based on block chain is close to be chatted and group close merely method and its system
CN106991334B (en) * 2016-11-24 2021-03-02 创新先进技术有限公司 Data access method, system and device
CN107370600B (en) * 2017-08-14 2020-06-19 华南理工大学 Method for generating core identity digital certificate and identity side digital certificate
CN108768630B (en) * 2018-05-25 2021-02-12 全链通有限公司 Encryption communication method and system for block chain node

Also Published As

Publication number Publication date
CN109981584A (en) 2019-07-05

Similar Documents

Publication Publication Date Title
CN109981584B (en) Block chain-based distributed social contact method
US11316677B2 (en) Quantum key distribution node apparatus and method for quantum key distribution thereof
JP3816337B2 (en) Security methods for transmission in telecommunications networks
JP5349619B2 (en) Identity-based authentication key agreement protocol
US20100042841A1 (en) Updating and Distributing Encryption Keys
US9065642B2 (en) Intercepting key sessions
CN104219051B (en) The communication means and system of a kind of inner group message
US20070162750A1 (en) Method for changing a group key in a group of network elements in a network system
CN103493427A (en) Discovery of security associations
Asokan Anonymity in a mobile computing environment
CN102088441A (en) Data encryption transmission method and system for message-oriented middleware
CN102088352B (en) Data encryption transmission method and system for message-oriented middleware
CN103997405B (en) A kind of key generation method and device
Ouda et al. Security protocols in service-oriented architecture
CN104301327A (en) Privacy protection system and method used for P2P social network and based on broadcast encryption
KR101760376B1 (en) Terminal and method for providing secure messenger service
CN112019553B (en) Data sharing method based on IBE/IBBE
US11848928B2 (en) Participant-managed, independent-trust authentication service for secure messaging
CN106789026A (en) CDN server and its with client connection method, private key server and system
CN111279655B (en) Data sharing method, system and server, communication terminal and recording medium
WO2022185328A1 (en) System and method for identity-based key agreement for secure communication
AU2012311701B2 (en) System and method for the safe spontaneous transmission of confidential data over unsecure connections and switching computers
CN113452514A (en) Key distribution method, device and system
CN116684091B (en) Relay multi-level data blockchain sharing method and system based on quantum key distribution
CN108306899B (en) A kind of method that safe transmission is carried out to sensitive data in cloud service environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant