Block chain shared data protection method
A technology of sharing data and blockchain, applied in the field of blockchain, can solve the problems of multiple verification times, low efficiency, long time, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0048] Assuming 4 transactions: [A, a', a], [B, b', b], [C, c', c], [D, d', d], the 4 transactions [A, a' , a], [B, b', b], [C, c', c], [D, d', d] are extracted from the same field, and A, B, C, D, a', b are obtained ', c', d' and a, b, c, d three sets of data; A, B, C, D are combined to generate a verification code matrix [A, B, C, D], and a', b', c' and d' are merged to generate the verification code two [a', b', c', d'] matrix, and a, b, c, d are combined to generate the verification code three matrix [a, b, c, d]; yes [A, B, C, D], [a', b', c', d'], [a, b, c, d] three verification code matrices are verified as follows in turn:
[0049] A ----------- send a'------------a;
[0050] B------------send b'------------b;
[0051] C ----------- send c'------------c;
[0052] D ----------- send d'------------d;
[0053] [Verification code matrix 1] [Verification code matrix 2] [Verification code matrix 3].
[0054] After verification, set N=hash[A, a', a], N is only known by ...
Embodiment 2
[0058] Suppose 7 transactions: [A, a', a], [B, b', b], [C, c', c], [D, d', d], [E, e', e], [F, f', f] [G, g', g], will 7 transactions [A, a', a], [B, b', b], [C, c', c], [D , d', d], [E, e', e], [F, f', f] [G, g', g] are extracted from the same field, and A, B, C, D, E, F, G, a', b', c', d', e', f', g' and a, b, c, d, e, f, g three sets of data; A, B, C, D , E, F, G are combined to generate a verification code matrix [A, B, C, D, E, F, G], and a', b', c', d', e', f', g' are combined Generate verification code two [a', b', c', d', e', f', g'] matrix, combine a, b, c, d, e, f, g to generate verification code three matrix [a , b, c, d, e, f, g]; for [A, B, C, D, E, F, G], [a', b', c', d', e', f', g'], [a, b, c, d, e, f, g] three verification code matrices are verified as follows in turn:
[0059] A ----------- send a'------------a;
[0060] B------------send b'------------b;
[0061] C ----------- send c'------------c;
[0062] D ----------- send d'------------d;
[0063]...
Embodiment 3
[0071] Suppose 10 transactions: [A, a', a], [B, b', b], [C, c', c], [D, d', d], [E, e', e], [F, f', f] [G, g', g], [H, h', h], [I, i', i], [J, j', j], among the 10 transactions [ A, a', a], [B, b', b], [C, c', c], [D, d', d], [E, e', e], [F, f', f] [G, g', g], [H, h', h], [I, i', i], [J, j', j] are extracted from the same fields to get A, B, C , D, E, F, G, H, I, J, a', b', c', d', e', f', g', h', i', j' and a, b, c , d, e, f, g, h, i, j three sets of data; A, B, C, D, E, F, G, H, I, J are combined to generate a verification code matrix [A, B, C, D, E, F, G, H, I, J], combine a', b', c', d', e', f', g', h', i', j' to generate verification Code two [a', b', c', d', e', f', g', h', i', j'] matrix, a, b, c, d, e, f, g, h, i, j are combined to generate three verification code matrixes [a, b, c, d, e, f, g, h, i, j]; for [A, B, C, D, E, F, G, H , I, J], [a', b', c', d', e', f', g', h', i', j'], [a, b, c, d, e, f , g, h, i, j] the three verification code matrices are verified ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com