Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for achieving data security communication by applying blockchain encryption technology

A data security and blockchain technology, applied in secure communication devices, relational databases, database models, etc., can solve problems such as the endless emergence of technologies and the increase in network vulnerabilities of network hackers

Pending Publication Date: 2020-09-11
重庆知翔科技有限公司
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In conventional technologies, data encryption technology is mostly used, and encrypted strings are formed by combining data and letters. However, due to the unstable environment of the network, various tampering technologies emerge in endlessly, and network hackers and network vulnerabilities are gradually increasing.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for achieving data security communication by applying blockchain encryption technology
  • Method for achieving data security communication by applying blockchain encryption technology
  • Method for achieving data security communication by applying blockchain encryption technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment (1

[0086] Embodiment (1) system

[0087] like figure 1 As shown, a system that applies blockchain encryption technology to realize data security communication, the system includes:

[0088] The data layer is provided with a database storing multiple data types in it, and the database at least includes a DB2 database, an oracle database, an Informix database, a Sybase database, a SQL Server database, a PostgreSQL database or a MySQL database;

[0089] The data encryption layer is provided with a data encryption unit, and the data encryption unit is a DES encryption unit, a 3DES encryption unit, a Blowfish encryption unit, a Twofish encryption unit, an IDEA encryption unit, an RC6 encryption unit, a character string encryption unit or a CAST5 encryption unit Wherein said data encryption unit is connected with an ant colony algorithm model, and said ant colony algorithm model external housing is provided with TCP / IP communication interface, ZigBee wireless communication interface, ...

Embodiment (2

[0110] Embodiment (2) method

[0111] like Image 6 As shown, a method of applying blockchain encryption technology to realize data security communication, wherein the method includes the following steps:

[0112] (1) Communication data extraction: Obtain various data information for information interaction with other devices from the database through data screening;

[0113] (2) Data encryption: use the ant colony algorithm to select the best data encryption unit from a variety of data encryption units to meet the needs of information interaction with different devices, such as Figure 7 As shown, the communication data is encrypted and calculated by the data encryption unit. After the encryption is completed, the encrypted data information is transmitted, and the data information is decrypted by the data decryption unit at the data information receiving end, wherein the data encryption unit and the data decryption unit All are completed through the encapsulation of the dig...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for achieving data security communication by applying a blockchain encryption technology, and relates to the technical field of data encryption. According to the invention, a secure communication system comprising a data layer, a data encryption layer, a data network layer, a data transmission layer and a data application layer is constructed; a block chain technology is integrated into data communication, safe transmission of data is realized, the transmitted data can be shared and cannot be tampered, the encryption performance of the data is improved, remote,online and real-time acquisition and application of the data can be achieved through systematic construction, and a user can achieve application, management and monitoring of database data without going to the site personally. According to the invention, the ant colony algorithm is adopted; according to the characteristics of data communication and the requirements of interaction equipment, the optimization search of the encryption algorithm is carried out among the plurality of encryption units, so that a user can quickly find out the optimal value of the target data suitable for applicationfrom the plurality of encryption algorithms, and the efficiency and the data management capability of the encryption unit application algorithm are greatly improved.

Description

technical field [0001] The present invention relates to the technical field of data encryption, and more specifically relates to a method for implementing secure data communication by applying block chain encryption technology. Background technique [0002] With the continuous development of the digital society and the exponential growth of data, data publishing has become a very important basic data service. However, traditional data publishing schemes face new challenges in data security and data deduplication. On the one hand, data publishing generally relies on trusted third parties and uses centralized servers to store data. Trusted third parties have problems such as single point of failure or internal / external attacks. At the same time, centralized servers are prone to software and hardware failures or system administrators intentionally or unintentionally operate, making data easy to be tampered with or even deleted, so that data security is affected. threaten. On...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06H04L29/06G06F16/25G06F16/27G06F16/28G06F21/60G06F21/64G06N3/00
CPCH04L9/0625H04L9/0643H04L9/065H04L63/0435G06F21/602G06F21/64G06N3/006G06F16/27G06F16/284G06F16/254
Inventor 不公告发明人
Owner 重庆知翔科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products