Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Operation data tamper-proofing method based on block chain

A technology of operating data and blockchain, applied in the field of blockchain, can solve problems such as files cannot be retrieved, data cannot be restored, etc., to achieve the effect of avoiding single point of failure, avoiding data black holes, and preventing illegal tampering

Inactive Publication Date: 2020-05-08
CHENGDU SEFON SOFTWARE CO LTD
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to: provide a block chain-based operation data tamper-proof method, which solves the existing data storage technology. If someone modifies the database, deletes the system log and modifies the backup file at the same time, It is almost impossible to retrieve the files before modification, and it is easy to cause serious consequences in the fields of finance and justice. However, the existing blockchain solutions only provide the function of data storage and cannot restore the data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] A block chain-based operation data tamper-proof method, based on the first system and the second system recording the first system log, also includes the following steps:

[0031] After the user writes the data into the database of the first system, the database of the first system encrypts the written data and records the ciphertext on the block chain;

[0032] When the user operates the database of the first system, the second system stores the log of the first system, and at the same time, the second system records the log of the first system into blocks on the blockchain.

[0033] Provide a blockchain-based data tamper-proof method for the supervision of illegal modification of the data system. The system adopts the separation of management and management of the business system and the tamper-proof supervision system, that is, the first system is the business system, and the second system is the The supervision system, while the data is entered into the local databa...

Embodiment 2

[0035] In this embodiment, on the basis of Embodiment 1, the first system uses MD5 or SHA series encryption algorithms to encrypt the written data. The characteristic of the irreversible encryption algorithm is that no key is used in the encryption process. After the plaintext is input, the system will directly process it into ciphertext through the encryption algorithm. This encrypted data cannot be decrypted. Only by re-entering the plaintext and going through the same process again Irreversible encryption algorithm processing, the same encrypted ciphertext is obtained and re-identified by the system before it can be truly decrypted.

Embodiment 3

[0037] On the basis of Embodiment 1, this embodiment further includes verifying the data in the database when the user reads the data in the database of the first system, and if the data has not been tampered with, the user directly uses the database of the first system If the data in is tampered with, an alarm will be issued.

[0038] Further, the method for the user to verify the data in the database is that the user reads the data in the database, encrypts the data according to the method of encrypting the written data in the database of the first system to obtain the verification ciphertext of the corresponding data, and verifies The ciphertext is compared with the ciphertext of the corresponding data on the blockchain. If they are the same, the data has not been tampered with. If they are different, the data has been tampered with.

[0039] Further, it also includes the data recovery method after the data has been tampered with:

[0040] The user reads the log of the fir...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an operation data tamper-proofing method based on a block chain and provides a data tamper-proofing method based on a block chain used for monitoring illegal modification of adata system. According to the system, a business system and a tamper-proof supervision system are managed separately, ciphertext of data is synchronously uploaded while the data is input into a locallibrary of the business system, and meanwhile, all operations of the business system on a database are uploaded and traceable through the supervision system, so that illegal operations are hidden andcomprehensively supervised. An existing data storage technology is solved. If someone modifies the database, deletes the system log and modifies the backup file at the same time, the file before modification can hardly be found, serious consequences are easily caused in the fields of finance, judicial administration and the like, and an existing scheme adopting a block chain only provides a data evidence storage function and can not restore the data.

Description

technical field [0001] The invention relates to the field of block chains, in particular to a method for preventing tampering of operation data based on block chains. Background technique [0002] The development of the blockchain has brought about a new revolution in today's digital economy era. It allows different institutions, different people, and different identities to trust each other in the blockchain, and fundamentally solves the problem of fraud in value transactions. The blockchain system can be divided into several layers: data layer, network layer, consensus layer, incentive layer, contract layer and application layer. The bottom layer of the blockchain forms the data storage mechanism at the bottom of the blockchain through data blocks and encryption algorithms. [0003] With the existing data storage technology, if someone modifies the database, deletes the system log and modifies the backup file at the same time, it is almost impossible to retrieve the file ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06F21/60G06F21/55
CPCG06F21/552G06F21/602G06F21/64
Inventor 查文宇张艳清葛兵李骥东王波李业晨张新龙张皖娜
Owner CHENGDU SEFON SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products