CN110457389A - A kind of underlay approach that block chain multichain data information is synchronous - Google Patents
A kind of underlay approach that block chain multichain data information is synchronous Download PDFInfo
- Publication number
- CN110457389A CN110457389A CN201910628987.4A CN201910628987A CN110457389A CN 110457389 A CN110457389 A CN 110457389A CN 201910628987 A CN201910628987 A CN 201910628987A CN 110457389 A CN110457389 A CN 110457389A
- Authority
- CN
- China
- Prior art keywords
- block
- multichain
- catenary system
- data information
- synchronous
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Medical Informatics (AREA)
- Computing Systems (AREA)
- Data Mining & Analysis (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
- Storage Device Security (AREA)
Abstract
A kind of underlay approach that block chain multichain data information is synchronous, include the following steps: step S1, multichain data information synchronous processing module data information synchronous needed for obtaining, recycle the common recognition mechanism of block catenary system that data information is packaged in a new block, the block that block catenary system marks this new is the candidate blocks of " contact block ";Step S2, it after the candidate blocks of " contact block " generate, persistently detects the signal that the multichain authentication module outside block catenary system is sent and then obtains block nearest in current main chain when detecting the signal for being ready for finishing;Step S3, nearest block is directed toward the candidate blocks of " contact block " in the current main chain that will acquire, and the candidate blocks of " contact block " rise to " contact block " at this time;Step S4, the synchronous information of inquiry in " contact block ".This method combines the authentication module outside block chain multichain data information synchronous processing module and block chain, can effectively realize the synchronizing information of multichain data;And guarantee the safety of interaction, the multichain network system suitable for different blocks catenary system composition using cryptological technique during synchronizing information.
Description
Technical field
The invention belongs to block chain information technical fields, and in particular to a kind of bottom that block chain multichain data information is synchronous
Method.
Background technique
Currently, the research progress of block chain Floor layer Technology has gone to a bottleneck period, most of block chain row dealers are
Very big expectation is had in arms to the universal of block chain.Various due to present block platform chain, the bottom of each block platform chain is set
Meter has the unique distinction of oneself again.However, block chain bottom generates the block of record data with common recognition mechanism, if having one
A multichain system wants that several relevant informations are recorded on different chains simultaneously, and the difference for mechanism of knowing together at this time, block generate
Mode difference can all cause information that the time irreversibility of chain is recorded, this can be generated in multichain system much inevitably asks
Topic.Therefore, it is desirable to which it is the severe problem of a comparison that the related data holding allowed between different blocks chain, which synchronizes,.
Summary of the invention
The technical problem to be solved by the present invention is to overcome the deficiencies of the prior art and provide a kind of block chain multichain data letter
Synchronous underlay approach is ceased, block chain multichain data information synchronous processing module is mutually tied with the authentication module outside block chain
It closes, can effectively realize the synchronizing information of multichain data;And interaction is guaranteed using cryptological technique during synchronizing information
Safety, the multichain network system suitable for different blocks catenary system composition.
The present invention provides a kind of underlay approach that block chain multichain data information is synchronous, includes the following steps:
Step S1, multichain data information synchronous processing module data information synchronous needed for obtaining, recycles block linkwork
Data information is packaged in a new block by the common recognition mechanism of system, and the block that block catenary system marks this new is " contact block "
Candidate blocks;
Step S2, it after the candidate blocks of " contact block " generate, persistently detects the multichain authentication module outside block catenary system and sends
Signal then obtain block nearest in current main chain when detecting the signal for being ready for finishing;
Step S3, nearest block is directed toward the candidate blocks of " contact block " in the current main chain that will acquire, at this time the time of " contact block "
Block is selected to rise to " contact block ";
Step S4, the synchronous information of inquiry in " contact block ".
As further technical solution of the present invention, " contact block " is same for specially recording multichain in all blocks of region chain
The block of step data information.
Further, block nearest in current main chain be block chain all blocks in be newly generated and be present in main chain
On block.
Further, in step S3, nearest block is directed toward the hash value of the candidate blocks of " contact block " in current main chain.
Further, authentication module is that each block catenary system sends final signal, and final signal is that block catenary system is
The no integrated signal for having been prepared for finishing.
Further, the signal that multichain authentication module is sent carries out encrypted and digitally signed, password using cryptographic algorithm
Algorithm is elliptical arch algorithm, and specific ciphering process is as follows:
Before region catenary system sends signal content, multichain authentication module presets an elliptic curve Ep (a, b), and chooses it
Go up some G as basic point;Region catenary system generates public key by private key privateKey, that is,
PublicKey=privateKey G;
Elliptic curve Ep (a, b), public key publicKey and basic point G are sent to block catenary system by multichain authentication module,
After block catenary system receives information, signal content to be sent is encoded to the point M on curve Ep (a, b), and generate with
Machine integer r, it is exactly two rectangular co-ordinates calculated according to M and r that block catenary system, which calculates C1 and C2, C1 and C2 according to M and r,
The point fastened, that is,
C1=M+r × publicKey
C2=r × G
And C1 and C2 are sent to multichain authentication module.
Further, ellipse curve signature process are as follows:
Region catenary system generates one group of public private key pair, in fact basic point G=G (x, y), and selects a random number r, passes through letter
Breath M, cryptographic Hash H and private key K calculate S=(H+Kx/r);Message M and signature { rG, S } are finally sent to multichain verifying mould
Block after multichain authentication module receives information, is verified signature with public key.
Further, after multichain authentication module is digitally signed verifying to ciphertext, ciphertext is decrypted again, it will be each
The signal content of block catenary system carries out an AND operation, and operation result is passed through elliptic curve cryptography and carries out digital label
Name, is subsequently sent to each block catenary system.
The invention has the benefit that
1) the multichain synchronizing information in network delay is realized.
2) privacy of block chain verification information in multichain verification process is effectively ensured.
3) scalability of this method is strong.
Detailed description of the invention
Fig. 1 is multichain data information synchronous processing module architecture diagram of the invention;
Fig. 2 is multichain authentication module architecture diagram of the invention.
Specific embodiment
Referring to Fig. 1, in the framework of multichain data information synchronous processing module,
Block (the area generated earliest that earliest block: generating earliest in all blocks of block chain and is present on main chain
Block may not necessarily access main chain).
Block (the area being newly generated that nearest block: being newly generated in all blocks of block chain and is present on main chain
Block may not necessarily access main chain).
The block that will be generated: the block of nearest block will be directed toward in all blocks of block chain.
Contact block: for specially recording the block of multichain synchrodata information, the usual block quilt in all blocks of block chain
Certain block is directed toward in main chain.
The present embodiment specific operating process is as follows:
The running of the module needs to interact with outside multichain authentication module, when entire block catenary system receives need to be into
When the request signal that row multichain data information synchronizes, system will trigger the synchronization of multichain data information, that is, multichain data
Synchronizing information processing module is started to work.
1) after triggering multichain data information synchronous processing module, module will obtain needing synchronous data information,
Then the data information of acquisition is packaged in a new block by the common recognition mechanism of the block catenary system, the process and master
The mode that chain generates block is consistent.But by the block that the module generates be not generate just it is linked on main chain, at this time it
It is present in block catenary system as " lonely block ", and special marking is carried out to " the lonely block ", identifies the candidate that it is " contact block "
Block.The generation of the block has miner as main chain block and digs mine reward, these contents at this time and are not disclosed in block chain
In system, but these information temporarily are stored.Referred to herein as " delay reward ".The entire candidate blocks mistake for generating " contact block "
Journey does not influence the generation of block on main chain, and main chain, which is constantly in, during being somebody's turn to do digs in mine generation block.The generation block of main chain and
It is isolation that the process, which generates block, is independent of each other.
2) after the candidate blocks of " contact block " generate, the multichain authentication module for starting to continue outside detection block catenary system is transmitted across
The signal come just obtains block nearest in current main chain once detecting the signal for being ready for finishing immediately.
3) after the module obtains current block recently, then " contact block " candidate blocks generated before finding, the working as of acquisition is allowed
Preceding nearest block is directed toward " contact block " candidate blocks hash value.At this point, " contact block " candidate blocks rise to " contact block ".
4) after " contact block " is born, from the miner for inquiring the block in " contact block " and mine reward is dug, at once provides delay
Miner's reward is sent to miner, and entire synchronizing information process terminates at this time.
" contact block " is connected on main chain as a subbranch, this mode both ensure that entire block catenary system more pacify
Entirely, synchronizing information of the multichain system in network delay is also achieved.
Guaranteeing that the safer reason of entire block catenary system is, traditional block catenary system only has a smooth main chain,
And determine which item be the standard of main chain is which branch is longer.Make entire block catenary system more multiple by increasing " contact block "
It is miscellaneous, by the quantity of contact block also as the standard for determining main chain, then for attacker, it is necessary to consider more factors,
Attack difficulty is caused to greatly increase, so that entire block catenary system is safer.
For the synchronizing information in network delay, perhaps the common recognition mechanism of multiple block catenary systems be different originally, just
At last using the same common recognition mechanism, the digging mine speed of each block catenary system is also discrepant.By digging mine in advance
Block is got out, after each block catenary system is ready to such block, by allowing current block to be recently directed toward " contact block "
The mode of candidate blocks is almost synchronization in user level, and maximum time difference will not be greater than network delay.
From the angle of user, user will not experience the processing variation of block chain bottom, while also assure multichain data
The synchronization cochain of information.
Referring to Fig. 2, it is outside block catenary system, dedicated for more in auxiliary block catenary system that multichain authentication module, which is in,
Chain data information synchronous processing module.
The module specific operating process is as follows:
Data information synchronizes after chain process starts, and each block catenary system can continue to send whether they have been prepared for
Signal.Since each block catenary system need to only be concerned about whether owner is ready for the final signal finished, without knowing
The signal that other block catenary systems are sent in the process.In order to reach such effect, present invention employs multi-party computations
Mode carries out signal processing.Multi-party computations are exactly one group of participant, are mutually mistrustful between them, but they
Wish to obtain when calculating an agreement function correctly as a result, the output data of each participant is secrecy simultaneously.Therefore pacify
Complete multi-party calculating is suitable for the authentication module.
Each block catenary system needs to calculate signal content using cryptography before sending the signal whether having had been prepared for
Method carries out encrypted and digitally signed.Such purpose is to ensure that the privacy of each block catenary system signal, verify simultaneously
Module can be verified the whether corresponding block catenary system of the signal received by way of digital signature and be sended over.
The cryptographic algorithm used is elliptic curve (ECC).Elliptic Curve Cryptography is a kind of to establish public-key cryptography
The algorithm of encryption is based on elliptic curve mathematics.In the present invention, signal encryption process is as follows:
Before block catenary system A sends signal content, authentication module selectes an elliptic curve Ep (a, b) in advance, and
It chooses on elliptic curve a bit, as basic point G;Subsequent system passes through in one private key of selection taken as privateKey
PrivateKey generates public key, that is,
PublicKey=privateKey_G
Elliptic curve Ep (a, b), public key publicKey and basic point G are sent to block catenary system A by authentication module;Area
After block catenary system A receives the information, signal content to be sent is encoded to the point M on Ep (a, b), and generate one with
Machine integer r;Block catenary system A passes through M and r calculating again and acquires C1 and C2, and C1 and C2 are exactly two calculated according to M and r
The point that rectangular co-ordinate is fastened, that is,
C1=M+r × publicKey
C2=r × G
C1 and C2 are sent to authentication module again by block catenary system A, and authentication module passes through C1, the C2 and private key received
PrivateKey is decrypted point M (point can be acquired by C1 and C2) in the signal that can be obtained block catenary system A transmission
Hold.
Ellipse curve signature (ECDSA) process is as follows:
Block catenary system A generates one group of public private key pair, in fact one random number r of basic point G=G (x, y) and selection, by disappearing
M, Hash H, private key K are ceased, S=(H+Kx/r) is calculated;Message M and signature { rG, S } are finally sent to authentication module;Verifying
After module receives information, signature is verified with public key, sender is strictly block catenary system A if being proved to be successful.
The each block catenary system of the module signal transmission be lasting, therefore in authentication module by multiple threads to each
Signal content ciphertext after the ciphering signature that block catenary system is sent is handled.Authentication module is digitally signed ciphertext and tests
After card, ciphertext is decrypted again.The signal content of each block catenary system is subjected to an AND operation, that is,
Signal 1&& signal 2&& ... && signal N
The result is passed through into elliptic curve cryptography and is digitally signed, each block catenary system is subsequently sent to.At this
In carry out encrypted and digitally signed purpose be, prevent attacker from distorting information so that each block catenary system was subject to
Final signal is variant, sends exception so as to cause data information is synchronous.
The mode that the authentication module application safety calculates in many ways ensures each block catenary system signal under multichain system
Privacy, and signal content is encrypted and signed using Elliptic Curve Cryptography algorithm, it ensure that signal content in transmission process
In safety.
Authentication module outside block chain multichain data information synchronous processing module and block chain combines, and can reach well
The effect synchronous to multichain data information, and under the guarantee of cryptological technique, it is safely interacted, can be adapted for difference
The multichain network system of block catenary system composition.
The basic principles, main features and advantages of the invention have been shown and described above.Those skilled in the art should
Understand, the present invention do not limited by above-mentioned specific embodiment, the description in above-mentioned specific embodiment and specification be intended merely into
One step illustrates the principle of the present invention, and under the premise of not departing from spirit of that invention range, the present invention also has various change and changes
Into these changes and improvements all fall within the protetion scope of the claimed invention.The scope of protection of present invention is by claim
Book and its equivalent thereof.
Claims (8)
1. a kind of synchronous underlay approach of block chain multichain data information, which comprises the steps of:
Step S1, multichain data information synchronous processing module data information synchronous needed for obtaining, recycles block catenary system
Data information is packaged in a new block by common recognition mechanism, and the block that block catenary system marks this new is the candidate of " contact block "
Block;
Step S2, after the candidate blocks of " contact block " generate, the letter that the multichain authentication module outside block catenary system is sent persistently is detected
Number, when detecting the signal for being ready for finishing, then obtain block nearest in current main chain;
Step S3, nearest block is directed toward the candidate blocks of " contact block " in the current main chain that will acquire, at this time the candidate blocks of " contact block "
Rise to " contact block ";
Step S4, the synchronous information of inquiry in " contact block ".
2. a kind of synchronous underlay approach of block chain multichain data information according to claim 1, which is characterized in that described
" contact block " is in all blocks of region chain for specially recording the block of multichain synchrodata information.
3. a kind of synchronous underlay approach of block chain multichain data information according to claim 1, which is characterized in that described
In current main chain nearest block be block chain all blocks in be newly generated and be present in the block on main chain.
4. a kind of synchronous underlay approach of block chain multichain data information according to claim 1, which is characterized in that described
In step S3, nearest block is directed toward the hash value of the candidate blocks of " contact block " in current main chain.
5. a kind of synchronous underlay approach of block chain multichain data information according to claim 1, which is characterized in that described
Authentication module is that each block catenary system sends final signal, and it is comprehensive whether final signal has been prepared for finishing for block catenary system
Close signal.
6. a kind of synchronous underlay approach of block chain multichain data information according to claim 1, which is characterized in that described
The signal that multichain authentication module is sent carries out encrypted and digitally signed using cryptographic algorithm, and the cryptographic algorithm is ellipse
Type algorithm, specific ciphering process are as follows:
Before region catenary system sends signal content, multichain authentication module preset an elliptic curve Ep (a, b), and selection thereon one
Put G as basic point;Region catenary system generates public key by private key privateKey, that is, publicKey=privateKey_G;
Elliptic curve Ep (a, b), public key publicKey and basic point G are sent to block catenary system, block by multichain authentication module
After catenary system receives information, signal content to be sent is encoded to the point M on curve Ep (a, b), and generates random whole
Number r, it is exactly that two rectangular co-ordinates calculated according to M and r are fastened that block catenary system, which calculates C1 and C2, C1 and C2 according to M and r,
Point, that is,
C1=M+r × publicKey
C2=r × G
And C1 and C2 are sent to multichain authentication module.
7. a kind of synchronous underlay approach of block chain multichain data information according to claim 6, which is characterized in that described
Ellipse curve signature process are as follows:
Region catenary system generates one group of public private key pair, in fact basic point G=G (x, y), and selects a random number r, by information M,
Cryptographic Hash H and private key K calculates S=(H+Kx/r);Message M and signature { rG, S } are finally sent to multichain authentication module, it is more
After chain authentication module receives information, signature is verified with public key.
8. a kind of synchronous underlay approach of block chain multichain data information according to claim 1, which is characterized in that described
After multichain authentication module is digitally signed verifying to ciphertext, ciphertext is decrypted again, by the signal of each block catenary system
Content carries out an AND operation, and operation result is passed through elliptic curve cryptography and is digitally signed, is subsequently sent to each
Block catenary system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910628987.4A CN110457389B (en) | 2019-07-12 | 2019-07-12 | Bottom layer method for synchronizing information of block chain multi-chain data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910628987.4A CN110457389B (en) | 2019-07-12 | 2019-07-12 | Bottom layer method for synchronizing information of block chain multi-chain data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110457389A true CN110457389A (en) | 2019-11-15 |
CN110457389B CN110457389B (en) | 2023-06-02 |
Family
ID=68482734
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910628987.4A Active CN110457389B (en) | 2019-07-12 | 2019-07-12 | Bottom layer method for synchronizing information of block chain multi-chain data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110457389B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111652613A (en) * | 2020-04-15 | 2020-09-11 | 珠海小礼鱼科技有限公司 | Intelligent block chain account distribution system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109189853A (en) * | 2018-08-08 | 2019-01-11 | 众安信息技术服务有限公司 | Method of data synchronization and device between a kind of block chain |
CN109379429A (en) * | 2018-10-25 | 2019-02-22 | 龚玉环 | A kind of multichain management method and system based on block chain |
CN109493222A (en) * | 2018-10-18 | 2019-03-19 | 尚维斯 | A kind of method of any number of block chain account book real-time synchronizations |
WO2019052286A1 (en) * | 2017-09-12 | 2019-03-21 | 广州广电运通金融电子股份有限公司 | User identity verification method, apparatus and system based on blockchain |
CN109522363A (en) * | 2018-10-18 | 2019-03-26 | 上海达家迎信息科技有限公司 | Cloud platform synchronous method, system, equipment and storage medium based on block chain |
-
2019
- 2019-07-12 CN CN201910628987.4A patent/CN110457389B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019052286A1 (en) * | 2017-09-12 | 2019-03-21 | 广州广电运通金融电子股份有限公司 | User identity verification method, apparatus and system based on blockchain |
CN109189853A (en) * | 2018-08-08 | 2019-01-11 | 众安信息技术服务有限公司 | Method of data synchronization and device between a kind of block chain |
CN109493222A (en) * | 2018-10-18 | 2019-03-19 | 尚维斯 | A kind of method of any number of block chain account book real-time synchronizations |
CN109522363A (en) * | 2018-10-18 | 2019-03-26 | 上海达家迎信息科技有限公司 | Cloud platform synchronous method, system, equipment and storage medium based on block chain |
CN109379429A (en) * | 2018-10-25 | 2019-02-22 | 龚玉环 | A kind of multichain management method and system based on block chain |
Non-Patent Citations (2)
Title |
---|
ANKUSH SINGLA 等: "Blockchain-based PKI solutions for IoT", 《2018 IEEE 4TH INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING》 * |
中国再保险(集团)股份有限公司 等: "一区、双块、多链、全程区块链技术助力创新再保险交易流程", 《上海保险》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111652613A (en) * | 2020-04-15 | 2020-09-11 | 珠海小礼鱼科技有限公司 | Intelligent block chain account distribution system |
Also Published As
Publication number | Publication date |
---|---|
CN110457389B (en) | 2023-06-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106411521B (en) | Identity authentication method, device and system for quantum key distribution process | |
CN109067524B (en) | Public and private key pair generation method and system | |
CN107094077B (en) | License chain account system without limiting signature algorithm | |
KR100823738B1 (en) | Method for integrity attestation of a computing platform hiding its configuration information | |
US20070033141A1 (en) | Information transmission system, and information sending apparatus and information receiving apparatus used therein | |
CN109150897B (en) | End-to-end communication encryption method and device | |
KR20140122188A (en) | Method for detecting a manipulation of a sensor and/or sensor data of the sensor | |
CN103414690A (en) | Publicly-verifiable cloud data possession checking method | |
US20190097805A1 (en) | Security device for providing security function for image, camera device including the same, and system on chip for controlling the camera device | |
US20150043735A1 (en) | Re-encrypted data verification program, re-encryption apparatus and re-encryption system | |
CN111010265B (en) | Block chain organization key management method based on hierarchical key and BLS digital signature | |
CN109034796A (en) | Transaction monitoring and managing method, electronic device and readable storage medium storing program for executing based on alliance's chain | |
CN109905384B (en) | Data migration method and system | |
CN113609213B (en) | Method, system, device and storage medium for synchronizing device keys | |
CN104836784A (en) | Information processing method, client, and server | |
CN110941857A (en) | Privacy management system and method of block chain intelligent contract platform | |
CN114598533B (en) | Block chain side chain cross-chain identity trusted authentication and data encryption transmission method | |
CN105471657B (en) | inter-domain communication log management method, device and system for virtual machine | |
CN103532709B (en) | A kind of IBE encryption apparatus and data encryption/decryption method | |
CN110457389A (en) | A kind of underlay approach that block chain multichain data information is synchronous | |
DE60202149D1 (en) | PROCESS FOR CRYPTOGRAPHIC AUTHENTICATION | |
CN111737766B (en) | Method for judging validity of digital certificate signature data in block chain | |
CN109495257B (en) | Data acquisition unit encryption method based on improved SM2 cryptographic algorithm | |
CN109102294B (en) | Information transmission method and device | |
JP2005012466A (en) | Message authentication method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |