CN116471053B - Data security encryption transmission method and system based on block chain - Google Patents
Data security encryption transmission method and system based on block chain Download PDFInfo
- Publication number
- CN116471053B CN116471053B CN202310299063.0A CN202310299063A CN116471053B CN 116471053 B CN116471053 B CN 116471053B CN 202310299063 A CN202310299063 A CN 202310299063A CN 116471053 B CN116471053 B CN 116471053B
- Authority
- CN
- China
- Prior art keywords
- data
- data transmission
- transmitted
- target node
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 180
- 238000000034 method Methods 0.000 title claims abstract description 17
- 238000012790 confirmation Methods 0.000 claims abstract description 39
- 238000012795 verification Methods 0.000 claims description 22
- 230000003213 activating effect Effects 0.000 claims description 2
- 238000004806 packaging method and process Methods 0.000 claims description 2
- 230000007274 generation of a signal involved in cell-cell signaling Effects 0.000 abstract description 6
- 238000012544 monitoring process Methods 0.000 description 5
- 238000004364 calculation method Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000005336 cracking Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Abstract
The invention relates to the field of data transmission, in particular to a block chain-based data security encryption transmission method and system. A blockchain-based data secure encryption transmission system comprising: the system comprises a data transmission application signal generation module, a public key library, a private key library, a data transmission application signal encryption module, a data transmission application signal decryption module, a data transmission confirmation signal generation module, a data transmission confirmation signal encryption module, a data transmission confirmation signal decryption module, a private network connection establishment module, a data transmission recording block and a data transmission recording block uploading module. The invention confirms the data transmission process in the mode of transmitting signals in the public network, and transmits the data entity in the private network, thereby avoiding the data entity from being exposed to most users when directly transmitting in the public network, further being cracked by violence and ensuring the safety of data transmission.
Description
Technical Field
The invention relates to the field of data transmission, in particular to a block chain-based data security encryption transmission method and system.
Background
With the popularization of networks, data transmission faces more transmission safety problems, and at present, the generally adopted method is to ensure the safety of data transmission through encryption, but the data transmission is carried out in a public network, and a user can tamper or steal the data through a brute force cracking mode.
Disclosure of Invention
The invention provides a data security encryption transmission method based on a blockchain, which confirms the data transmission process in a mode of transmitting signals in a public network, and transmits data entities in a private network, so that the data entities are prevented from being exposed to most users when being directly transmitted in the public network, and are further cracked by violence, and the security of data transmission is ensured.
The data security encryption transmission method based on the block chain specifically comprises the following steps:
s1: the method comprises the steps that a server node sending data is marked as a source node, a server node receiving the data is marked as a target node, a data transmission application signal is generated according to the data to be transmitted, the source node encrypts the data transmission application signal through a private key built in the source node, the data transmission application signal comprises address information of the source node and the target node and data codes corresponding to the data to be transmitted, and the encrypted data transmission application signal is sent to the target node through a public network;
s2: when the target node receives the encrypted data transmission application signal, traversing the target node built-in public keys in the target node built-in public key library, decrypting the encrypted data transmission application signal one by one through the target node built-in public keys, and if the decryption is successful, entering S3; if the decryption fails, the target node refuses the data transmission application;
s3: the target node generates a data transmission confirmation signal according to the data transmission application signal, wherein the data transmission confirmation signal comprises address information of the target node and the source node and data codes corresponding to data to be transmitted, encrypts the data transmission confirmation signal through a built-in private key of the target node, and sends the encrypted data transmission confirmation signal to the source node through a public network;
s4: when the source node receives the encrypted data transmission confirmation signal, traversing the source node built-in public key in the source node built-in public key library, decrypting the encrypted data transmission confirmation signal one by one through the source node built-in public key, and if the decryption is successful, entering S5; if the decryption fails, the source node does not transmit data and refuses the data transmission confirmation signal;
s5: after a first preset time interval, activating private network connection between a source node and a target node, acquiring corresponding data to be transmitted by the source node according to corresponding data codes in a data transmission confirmation signal, and transmitting the data to be transmitted from the source node to the target node through the private network;
s6: and generating a data transmission record between the source node and the target node, packaging the data transmission record into a data transmission record block, and uploading the data transmission record block to the blockchain network.
As a preferred aspect, the data transmission application signal further includes a theoretical hash value of data to be transmitted corresponding to the data to be transmitted, and when the target node decrypts the encrypted data transmission application signal successfully through the built-in public key of the target node, the target node stores the theoretical hash value of the data to be transmitted in the data transmission application signal in one-to-one correspondence with the data code of the data to be transmitted; when the target node obtains data to be transmitted through a private network, calculating an actual hash value of the data to be transmitted, taking a data code of the data to be transmitted as an index, obtaining a theoretical hash value of the data to be transmitted and the actual hash value of the data to be transmitted, judging whether the two values are consistent, if so, entering S6; if the two are inconsistent, the data transmission behavior is abandoned, and the target node reminds the source node to carry out data transmission again.
As a preferred aspect, for step S5, before transmitting data to be transmitted from a source node to a target node through a private network, the source node sends a verification data packet to the target node through the private network, and judges whether the target node acquires the verification data packet through the private network in a second preset time, if the target node does not acquire the verification data packet in the second preset time, the target node does not transmit the data to be transmitted, and sends warning information to an administrator; if the target node does not acquire the verification data packet within the second preset time, starting a transmission process of the data to be transmitted through the private network.
As a preferred aspect, the second preset time is a sum of the first preset time, the private network transmission time, and the fluctuation time.
In a preferred aspect, in the step S5, when the data to be transmitted is transmitted from the source node to the destination node through the private network, the data to be transmitted is encrypted by using an asymmetric encryption algorithm.
In a preferred aspect, in the step S5, the private network is a network channel established by the wireless device through a wireless protocol.
A blockchain-based data secure encryption transmission system comprising:
the data transmission application signal generation module is used for generating a data transmission application signal;
the public key library is used for storing the built-in public key of the source node and the built-in public key of the target node;
the private key library is used for storing a built-in private key of the source node and a built-in private key of the target node;
the data transmission application signal encryption module is used for encrypting the data transmission application signal according to the built-in private key of the source node;
the data transmission application signal decryption module is used for decrypting the encrypted data transmission application signal according to the built-in public key of the target node;
the data transmission confirmation signal generation module is used for generating a data transmission confirmation signal;
the data transmission confirmation signal encryption module is used for encrypting the data transmission confirmation signal according to the built-in private key of the target node;
the data transmission confirmation signal decryption module is used for decrypting the encrypted data transmission confirmation signal according to the built-in private key of the source node;
the private network connection establishment module is used for establishing private network connection between the active source node and the target node;
the data transmission module is used for transmitting the data to be transmitted from the source node to the target node through the private network;
a data transmission recording block for generating a data transmission recording block;
and the data transmission record block uploading module is used for uploading the data transmission record block to the block chain network.
As a preferred aspect, further comprising:
the hash value calculation module is used for calculating a theoretical hash value of the data to be transmitted and an actual hash value of the data to be transmitted, which correspond to the data to be transmitted;
the hash value matching module is used for judging whether the theoretical hash value of the data to be transmitted is consistent with the actual hash value of the data to be transmitted.
As a preferred aspect, further comprising:
the verification data packet generation module is used for generating a verification data packet;
and the verification data packet monitoring module is used for monitoring whether the verification data packet is acquired or not through the private network in a second preset time.
The invention has the following advantages:
1. the invention confirms the data transmission process in the mode of transmitting signals in the public network, and transmits the data entity in the private network, thereby avoiding the data entity from being exposed to most users when directly transmitting in the public network, further being cracked by violence and ensuring the safety of data transmission.
2. According to the invention, the data transmission record is uploaded to the blockchain network, so that the data transmission record is ensured not to be tampered while being stored, the data transmission record is convenient for a subsequent user to trace the source, and the safety of data transmission is further enhanced.
3. According to the invention, the theoretical hash value of the data to be transmitted and the actual hash value of the data to be transmitted are matched and judged, and when the theoretical hash value and the actual hash value are inconsistent, the data transmission behavior is abandoned, the target node is prevented from receiving tampered data to be transmitted, and the accuracy of data transmission is ensured.
4. The invention detects the security of private network transmission by setting the verification data packet, and avoids the data to be transmitted from being stolen in the transmission process.
Drawings
Fig. 1 is a schematic structural diagram of a block chain-based data secure encryption transmission system according to an embodiment of the present invention.
Fig. 2 is a schematic structural diagram of a hash value calculation module and a hash value matching module in an embodiment of the present invention.
Detailed Description
In order to enable those skilled in the art to better understand the technical solution of the present invention, the technical solution of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.
Example 1
When data transmission is carried out, a data security encryption transmission method based on a block chain can be adopted, and the method specifically comprises the following steps:
s1: the method comprises the steps that a server node sending data is marked as a source node, a server node receiving the data is marked as a target node, a data transmission application signal is generated according to the data to be transmitted, the source node encrypts the data transmission application signal through a built-in private key of the source node, the data transmission application signal comprises address information of the source node and the target node and data codes corresponding to the data to be transmitted, and the encrypted data transmission application signal is sent to the target node through a public network.
S2: when the target node receives the encrypted data transmission application signal, traversing the target node built-in public keys in the target node built-in public key library, decrypting the encrypted data transmission application signal one by one through the target node built-in public keys, if the decryption is successful, indicating that the target node has a public key corresponding to the source node built-in private key, allowing data transmission between the source node and the target node, and entering S3; if the decryption fails, the target node does not have a public key corresponding to the private key built in the source node, the data transmission is not allowed between the source node and the target node, and the target node refuses the data transmission application.
S3: the target node generates a data transmission confirmation signal according to the data transmission application signal, wherein the data transmission confirmation signal comprises address information of the target node and the source node and data codes corresponding to data to be transmitted, encrypts the data transmission confirmation signal through a built-in private key of the target node, and sends the encrypted data transmission confirmation signal to the source node through a public network.
S4: when the source node receives the encrypted data transmission confirmation signal, traversing the source node built-in public key in the source node built-in public key library, decrypting the encrypted data transmission confirmation signal one by one through the source node built-in public key, if the decryption is successful, explaining the fact that the source node already knows that the target node receives the data transmission application signal and confirms, and starting to transmit data, and entering S5; if the decryption fails, the data transmission application signal may be tampered, not accepted by the source node, the source node does not transmit data, and the data transmission confirmation signal is refused.
S5: after a first preset time is spaced, the private network connection between the source node and the target node is activated, the first preset time defaults to 5s, the source node acquires corresponding data to be transmitted according to the corresponding data code in the data transmission confirmation signal, the data to be transmitted is transmitted from the source node to the target node through the private network, the data to be transmitted is encrypted by the MD5, and the private network is a network channel established through wireless equipment through a wireless protocol.
The invention confirms the data transmission process in the mode of transmitting signals in the public network, and transmits the data entity in the private network, thereby avoiding the data entity from being exposed to most users when directly transmitting in the public network, further being cracked by violence and ensuring the safety of data transmission.
S6: the data transmission record between the source node and the target node is generated, and the data transmission record is packed into a data transmission record block and uploaded to the blockchain network, and the blockchain technology is a very mature technology and is not described in detail herein.
According to the invention, the data transmission record is uploaded to the blockchain network, so that the data transmission record is ensured not to be tampered while being stored, the data transmission record is convenient for a subsequent user to trace the source, and the safety of data transmission is further enhanced.
In order to further improve the safety of data transmission, the method also considers the safety of private network transmission, the data transmission application signal also comprises a theoretical hash value of the data to be transmitted corresponding to the data to be transmitted, and when the target node successfully decrypts the encrypted data transmission application signal through the built-in public key of the target node, the target node stores the theoretical hash value of the data to be transmitted in the data transmission application signal in one-to-one correspondence with the data codes of the data to be transmitted; when the target node obtains data to be transmitted through a private network, calculating an actual hash value of the data to be transmitted, taking a data code of the data to be transmitted as an index, obtaining a theoretical hash value of the data to be transmitted and the actual hash value of the data to be transmitted, judging whether the two values are consistent, if so, indicating that the data to be transmitted does not have tamper behavior in the transmission process, trusting the data transmission behavior, and entering S6; if the hash value and the hash value are inconsistent, the hash value has the characteristic of uniqueness, so that the fact that the data to be transmitted has tamper behavior in the transmission process is indicated, the data transmission is the wrong data transmission, the data transmission behavior is abandoned, and the target node reminds the source node to carry out data transmission again.
According to the invention, the theoretical hash value of the data to be transmitted and the actual hash value of the data to be transmitted are matched and judged, and when the theoretical hash value and the actual hash value are inconsistent, the data transmission behavior is abandoned, the target node is prevented from receiving tampered data to be transmitted, and the accuracy of data transmission is ensured.
For step S5, before transmitting the data to be transmitted from the source node to the target node through the private network, the source node sends a verification data packet to the target node through the private network, judges whether the target node acquires the verification data packet or not through the private network monitoring within a second preset time, wherein the second preset time is the sum of the first preset time, the private network transmission time and the fluctuation time, the fluctuation time is set manually, and is determined by network fluctuation, equipment delay and the like, if the target node does not acquire the verification data packet within the second preset time, the risk of stealing the data to be transmitted is indicated, the data to be transmitted is not transmitted to an administrator terminal, and the administrator terminal is reminded of the risk of stealing the private network connection information, and the maintenance is needed immediately; if the target node does not acquire the verification data packet within the second preset time, the fact that the data to be transmitted does not have the risk of being stolen in the transmission process is indicated, and the transmission process of the data to be transmitted through the private network is started.
The invention detects the security of private network transmission by setting the verification data packet, and avoids the data to be transmitted from being stolen in the transmission process.
Example 2
A blockchain-based data secure encryption transmission system, as shown in fig. 1, comprising:
the data transmission application signal generation module is used for generating a data transmission application signal;
the public key library is used for storing the built-in public key of the source node and the built-in public key of the target node, and as any server node can be used as the source node or the target node, each server node is internally provided with a public key library;
the private key library is used for storing a built-in private key of the source node and a built-in private key of the target node, and each server node is internally provided with a private key library;
the data transmission application signal encryption module is used for encrypting the data transmission application signal according to the built-in private key of the source node;
the data transmission application signal decryption module is used for decrypting the encrypted data transmission application signal according to the built-in public key of the target node;
the data transmission confirmation signal generation module is used for generating a data transmission confirmation signal;
the data transmission confirmation signal encryption module is used for encrypting the data transmission confirmation signal according to the built-in private key of the target node;
the data transmission confirmation signal decryption module is used for decrypting the encrypted data transmission confirmation signal according to the built-in private key of the source node;
the private network connection establishment module is used for establishing private network connection between the active source node and the target node;
the data transmission module is used for transmitting the data to be transmitted from the source node to the target node through the private network;
a data transmission recording block for generating a data transmission recording block;
and the data transmission record block uploading module is used for uploading the data transmission record block to the block chain network.
The block chain based data secure encryption transmission system, as shown in fig. 2, further comprises:
the hash value calculation module is used for calculating a theoretical hash value of the data to be transmitted and an actual hash value of the data to be transmitted, which correspond to the data to be transmitted;
the hash value matching module is used for judging whether the theoretical hash value of the data to be transmitted is consistent with the actual hash value of the data to be transmitted.
The block chain based data security encryption transmission system, as shown in fig. 1, further comprises:
the verification data packet generation module is used for generating a verification data packet;
and the verification data packet monitoring module is used for monitoring whether the verification data packet is acquired or not through the private network in a second preset time.
It will be understood that modifications and variations will be apparent to those skilled in the art from the foregoing description, and it is intended that all such modifications and variations be included within the scope of the following claims. Parts of the specification not described in detail belong to the prior art known to those skilled in the art.
Claims (4)
1. The data security encryption transmission method based on the block chain is characterized by comprising the following steps of:
s1: the method comprises the steps that a server node sending data is marked as a source node, a server node receiving the data is marked as a target node, a data transmission application signal is generated according to the data to be transmitted, the source node encrypts the data transmission application signal through a private key built in the source node, the data transmission application signal comprises address information of the source node and the target node and data codes corresponding to the data to be transmitted, and the encrypted data transmission application signal is sent to the target node through a public network;
s2: when the target node receives the encrypted data transmission application signal, traversing the target node built-in public keys in the target node built-in public key library, decrypting the encrypted data transmission application signal one by one through the target node built-in public keys, and if the decryption is successful, entering S3; if the decryption fails, the target node refuses the data transmission application;
s3: the target node generates a data transmission confirmation signal according to the data transmission application signal, wherein the data transmission confirmation signal comprises address information of the target node and the source node and data codes corresponding to data to be transmitted, encrypts the data transmission confirmation signal through a built-in private key of the target node, and sends the encrypted data transmission confirmation signal to the source node through a public network;
s4: when the source node receives the encrypted data transmission confirmation signal, traversing the source node built-in public key in the source node built-in public key library, decrypting the encrypted data transmission confirmation signal one by one through the source node built-in public key, and if the decryption is successful, entering S5; if the decryption fails, the source node does not transmit data and refuses the data transmission confirmation signal;
s5: after a first preset time interval, activating private network connection between a source node and a target node, acquiring corresponding data to be transmitted by the source node according to corresponding data codes in a data transmission confirmation signal, and transmitting the data to be transmitted from the source node to the target node through the private network;
s6: generating a data transmission record between a source node and a target node, packaging the data transmission record into a data transmission record block, and uploading the data transmission record block to a block chain network;
the data transmission application signal also comprises a theoretical hash value of the data to be transmitted, which corresponds to the data to be transmitted, and when the target node successfully decrypts the encrypted data transmission application signal through the built-in public key of the target node, the target node stores the theoretical hash value of the data to be transmitted in the data transmission application signal in one-to-one correspondence with the data codes of the data to be transmitted; when the target node obtains data to be transmitted through a private network, calculating an actual hash value of the data to be transmitted, taking a data code of the data to be transmitted as an index, obtaining a theoretical hash value of the data to be transmitted and the actual hash value of the data to be transmitted, judging whether the two values are consistent, if so, entering S6; if the two are inconsistent, giving up the data transmission behavior, and reminding the source node to carry out data transmission again by the target node;
for step S5, before transmitting the data to be transmitted from the source node to the target node through the private network, the source node sends a verification data packet to the target node through the private network, and judges whether the target node acquires the verification data packet through the private network in a second preset time, if so, the target node does not acquire the verification data packet in the second preset time, does not transmit the data to be transmitted, and sends warning information to the administrator; if the target node does not acquire the verification data packet within the second preset time, starting a transmission process of the data to be transmitted through the private network.
2. The blockchain-based data secure encryption transmission method of claim 1, wherein the second preset time is a sum of the first preset time, the private network transmission time and the fluctuation time.
3. The method according to claim 1, wherein in step S5, when the data to be transmitted is transmitted from the source node to the destination node through the private network, the data to be transmitted is encrypted by using an asymmetric encryption algorithm.
4. The method according to claim 1, wherein in step S5, the private network is a network channel established by the wireless device through a wireless protocol.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310299063.0A CN116471053B (en) | 2023-03-24 | 2023-03-24 | Data security encryption transmission method and system based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310299063.0A CN116471053B (en) | 2023-03-24 | 2023-03-24 | Data security encryption transmission method and system based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116471053A CN116471053A (en) | 2023-07-21 |
CN116471053B true CN116471053B (en) | 2023-10-20 |
Family
ID=87174309
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310299063.0A Active CN116471053B (en) | 2023-03-24 | 2023-03-24 | Data security encryption transmission method and system based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116471053B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110011813A (en) * | 2019-04-12 | 2019-07-12 | 湘潭大学 | A kind of data hiding transmission method based on block chain |
CN112055025A (en) * | 2020-09-10 | 2020-12-08 | 广西师范大学 | Privacy data protection method based on block chain |
CN113190860A (en) * | 2021-05-07 | 2021-07-30 | 福建福链科技有限公司 | Block chain sensor data authentication method and system based on ring signature |
CN114513327A (en) * | 2021-12-30 | 2022-05-17 | 电子科技大学 | Block chain-based Internet of things privacy data rapid sharing method |
CN115567326A (en) * | 2022-11-21 | 2023-01-03 | 北京邮电大学 | Data transaction method and device based on block chain |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109462472A (en) * | 2017-09-06 | 2019-03-12 | 阿里巴巴集团控股有限公司 | The methods, devices and systems of data encryption and decryption |
-
2023
- 2023-03-24 CN CN202310299063.0A patent/CN116471053B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110011813A (en) * | 2019-04-12 | 2019-07-12 | 湘潭大学 | A kind of data hiding transmission method based on block chain |
CN112055025A (en) * | 2020-09-10 | 2020-12-08 | 广西师范大学 | Privacy data protection method based on block chain |
CN113190860A (en) * | 2021-05-07 | 2021-07-30 | 福建福链科技有限公司 | Block chain sensor data authentication method and system based on ring signature |
CN114513327A (en) * | 2021-12-30 | 2022-05-17 | 电子科技大学 | Block chain-based Internet of things privacy data rapid sharing method |
CN115567326A (en) * | 2022-11-21 | 2023-01-03 | 北京邮电大学 | Data transaction method and device based on block chain |
Also Published As
Publication number | Publication date |
---|---|
CN116471053A (en) | 2023-07-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101032016B1 (en) | Constrained cryptographic keys | |
US5297208A (en) | Secure file transfer system and method | |
US7991998B2 (en) | Secure proximity verification of a node on a network | |
EP1025675B1 (en) | Security of data connections | |
CN102077213B (en) | Techniques for ensuring authentication and integrity of communications | |
US9491174B2 (en) | System and method for authenticating a user | |
US8122487B2 (en) | Method and apparatus for checking proximity between devices using hash chain | |
US20100058052A1 (en) | Methods, systems and devices for securing supervisory control and data acquisition (scada) communications | |
EP2270710A1 (en) | Method for restricting access to media data generated by a camera | |
KR101706117B1 (en) | Apparatus and method for other portable terminal authentication in portable terminal | |
CN108462695B (en) | Method, device and system for safely transmitting data | |
KR101675332B1 (en) | Data commincaiton method for vehicle, Electronic Control Unit and system thereof | |
CN111080299B (en) | Anti-repudiation method for transaction information, client and server | |
KR101651648B1 (en) | Data communication method for vehicle, Electronic Control Unit and system thereof | |
KR20070063534A (en) | Regular content check system | |
CN116471053B (en) | Data security encryption transmission method and system based on block chain | |
CN110572261A (en) | data encryption transmission method | |
CN112822016B (en) | Method for data authorization on block chain and block chain network | |
CN113115309B (en) | Data processing method and device for Internet of vehicles, storage medium and electronic equipment | |
CN112217797B (en) | Intelligent gateway Internet of things control system and method applying block chain technology | |
US20050108528A1 (en) | Computer network and method for transmitting and authenticating data in the computer network | |
CN109981678B (en) | Information synchronization method and device | |
CN115102750B (en) | Private data processing method, system, computer terminal and readable storage medium | |
US11882434B2 (en) | Method and device for covertly communicating state changes | |
CN116419217B (en) | OTA data upgrading method, system, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |