Operation data tamper-proofing method based on block chain
A technology of operating data and blockchain, applied in the field of blockchain, can solve problems such as files cannot be retrieved, data cannot be restored, etc., to achieve the effect of avoiding single point of failure, avoiding data black holes, and preventing illegal tampering
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0030] A block chain-based operation data tamper-proof method, based on the first system and the second system recording the first system log, also includes the following steps:
[0031] After the user writes the data into the database of the first system, the database of the first system encrypts the written data and records the ciphertext on the block chain;
[0032] When the user operates the database of the first system, the second system stores the log of the first system, and at the same time, the second system records the log of the first system into blocks on the blockchain.
[0033] Provide a blockchain-based data tamper-proof method for the supervision of illegal modification of the data system. The system adopts the separation of management and management of the business system and the tamper-proof supervision system, that is, the first system is the business system, and the second system is the The supervision system, while the data is entered into the local databa...
Embodiment 2
[0035] In this embodiment, on the basis of Embodiment 1, the first system uses MD5 or SHA series encryption algorithms to encrypt the written data. The characteristic of the irreversible encryption algorithm is that no key is used in the encryption process. After the plaintext is input, the system will directly process it into ciphertext through the encryption algorithm. This encrypted data cannot be decrypted. Only by re-entering the plaintext and going through the same process again Irreversible encryption algorithm processing, the same encrypted ciphertext is obtained and re-identified by the system before it can be truly decrypted.
Embodiment 3
[0037] On the basis of Embodiment 1, this embodiment further includes verifying the data in the database when the user reads the data in the database of the first system, and if the data has not been tampered with, the user directly uses the database of the first system If the data in is tampered with, an alarm will be issued.
[0038] Further, the method for the user to verify the data in the database is that the user reads the data in the database, encrypts the data according to the method of encrypting the written data in the database of the first system to obtain the verification ciphertext of the corresponding data, and verifies The ciphertext is compared with the ciphertext of the corresponding data on the blockchain. If they are the same, the data has not been tampered with. If they are different, the data has been tampered with.
[0039] Further, it also includes the data recovery method after the data has been tampered with:
[0040] The user reads the log of the fir...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com