Position: Home page » Blockchain » Block chain transmission cipher

Block chain transmission cipher

Publish: 2021-04-26 23:31:44
1. In view of the security characteristics and shortcomings of the existing blockchain technology, we need to build a security system around the physical, data, application system, encryption, risk control and other aspects to improve the security performance of the blockchain system as a whole
1. Physical security
the network and host running the blockchain system should be in a protected environment. According to the regulatory requirements of specific business, the protection measures can be used to protect the physical network and host by means of VPN, firewall, physical isolation, etc
2. Data security
in principle, the data exchange between nodes of the blockchain should not be transmitted in clear text. For example, asymmetric encryption can be used to negotiate key, and symmetric encryption algorithm can be used to encrypt and decrypt data. The data provider should also strictly evaluate the sensitivity and security level of the data, decide whether to send the data to the blockchain, whether to desensitize the data, and adopt strict access control measures
3. Application system security
application system security needs to start from the aspects of identity authentication, authority system, transaction rules, anti fraud strategy, etc.
relevant personnel, transaction nodes and transaction data involved in application operation should be controlled in advance and auditable afterwards. Taking financial blockchain as an example, consensus algorithm with stronger fault tolerance, anti fraud and higher performance can be adopted to avoid joint fraud of some nodes
4. Key security
to encrypt the communication data between the blockchain nodes and the key to encrypt the data stored on the blockchain nodes, the plaintext should not exist on the same node, and the private key should be properly saved by the encryption machine. When the key is lost or leaked, the system can identify the relevant records of the original key, such as account control, communication encryption, data storage encryption, etc., and implement response measures to make the original key invalid. The key should also be managed strictly in the life cycle, and should not be permanently valid. It needs to be replaced after reaching a certain time cycle
5. Risk control mechanism
there should be careful detection measures for the network layer, host operation, data access of application system, transaction frequency and other dimensions of the system. For any suspicious operation, alarm, record and verification should be carried out. If illegal operation is found, loss assessment should be carried out, remedial measures should be taken at the technical and business levels, and security measures should be strengthened, And trace the source of illegal operation to prevent further attacks

Article source: white paper on blockchain technology and application development in China
2. Recently, the hottest investment is bitcoin. From financial tycoons to ordinary people, they are talking about the surge of bitcoin. Bitcoin is a kind of blockchain. I believe there are still many people who don't know much about blockchain, so today we will explain in detail what blockchain is? How to search blockchain technology patents? What is blockchain? More than 10000 years ago, human beings began to learn to use shells as an intermediary for exchanging materials, and later developed into currency. With the development of network, the circulation of digital currency has graally replaced the traditional currency, and now people's payment methods have undergone unprecedented changes. The emergence of encrypted electronic currencies such as bitcoin, Ethereum and litecoin has further prompted the whole financial system to face up to and start thinking about transformation. However, there is an important technical support behind the development of encrypted e-money which is not affected by the traditional financial system;; Block chain. Blockchain is a new application mode of distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and other computer technologies. The so-called consensus mechanism is a mathematical algorithm to establish trust and obtain interests between different nodes in the blockchain system. How to search blockchain technology patents Blockchain Revolution & sup1; A book has mentioned that blockchain is a public database, which records all transaction information and can effectively prevent tampering; It is a distributed system, which does not store on a specific server or node, but scattered in countless nodes on the network, each node only retains part of the information; It is a kind of consensus agreement, which follows a mechanism together. As the underlying technology behind cryptocurrency, including identity authentication, medical record preservation, market forecasting, asset trading, etc., blockchain is graally applied. To observe the patent applications related to global blockchain technology, the author suggests that you should refer to the definitions of block chain, distributed ledger and smart contract to expand your search conditions, rather than only limited to the patents using the word block chain. What is blockchain? How to search blockchain technology patents? If you have more questions about patent inquiry, you can continue to pay attention to Bajie intellectual property or contact us by telephone.
3. Blockchain encryption algorithm
asymmetric encryption algorithm is a function that converts the original plaintext file or data into a series of unreadable ciphertext codes by using an encryption key. The encryption process is irreversible. Only holding the corresponding decryption key can the encrypted information be decrypted into readable plaintext. Encryption enables private data to be transmitted through the public network under the condition of low risk, and protects the data from being stolen and read by the third party
the core advantage of blockchain technology is decentralization, which can realize point-to-point transaction, coordination and cooperation based on decentralized credit in a distributed system without mutual trust by means of data encryption, time stamp, distributed consensus and economic incentive, so as to solve the high cost and low cost of centralized institutions Low efficiency and data storage insecurity provide solutions
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
4. 1. Blockchain is an anti tampering, shared and traceable distributed ledger technology. Anti tampering lies in that the modification of a single node can only be recognized through the consensus of other nodes; Traceability means that the whole account book of the blockchain can only be written in, not deleted, and all modification records will be left marks on the whole chain; Sharing means that the account book of the whole blockchain is transparent to multiple nodes in the distributed network
hash function in blockchain is the key to anti tampering, and hash algorithm is a one-way cryptographic mechanism to ensure that transaction information is not tampered in blockchain. After receiving a piece of plaintext, hash algorithm will transform it into a short and fixed hash data in an irreversible way. So block association has but is not limited to tamper proof
2. Quantum secure communication is divided into quantum cryptography communication, quantum teleportation and quantum dense coding. It can be divided into classical communication and quantum communication. The former mainly transmits quantum key, while the latter can be used for quantum teleportation and quantum entanglement distribution. When quantum communication is eavesdropped, although the eavesdropper can't get the information, the communication is interrupted, which affects the normal communication. His anti eavesdropping is at the cost of interrupting the communication, so it doesn't seem as good as the legend.. At present, there are still many unsolved problems in quantum communication, such as short transmission distance, relay difficulty and so on
3. In secure communication, technology competition and complementarity are mutual reference and common development. In secure communication, blockchain should belong to network layer, and quantum communication should belong to physical layer. Therefore, there should be no competition result of who will replace who.
5. VAT invoice is also a kind of invoice. Enterprises with the qualification of general VAT taxpayer can apply to the competent state tax department for purchasing VAT invoice and issue it through the anti-counterfeiting tax control system. Enterprises with the qualification of general VAT taxpayer can dect vat by VAT invoice. Special invoice is the abbreviation of "VAT special invoice". An invoice issued for the sale of goods subject to VAT. After the implementation of the Provisional Regulations of the people's Republic of China on value added tax, in order to ensure the implementation of the tax dection system of value-added tax which belongs to extra price tax, it is printed and distributed for the use of enterprises. When taxpayers sell goods or taxable services, they shall issue special VAT invoices to the purchasers, indicating the sales amount and output tax amount respectively. The use of special invoice as dection voucher is limited to the general taxpayers who are both VAT buyers and sellers.
6. Blockchain itself is a tool called decentralization and distrust. For example, when you graate from University, the current practice is to have a certificate recognized and issued by an authoritative authority as a certificate
this setting is troublesome, because it is a piece of paper, which can be forged, and there will be various gaps. The issuing authority is also a person, and there will be various gaps in the middle. As long as it is related to people, there will be various possibilities related to which media
blockchain provides a good opportunity. As soon as you graate, you can generate a record on the blockchain. No one can change this record. This thing exists objectively. As a physical existence, and then as a data existence, blockchain will be generated
in this way, it is easy for anyone who wants to find out where he graated from
this is similar to the big data often used in social networking (WeChat) and payment platforms (Alipay, Yi Bao).
7. TCP (transmission control protocol) and UDP (User Datagram Protocol) belong to transport layer protocol. TCP provides reliable data transmission in IP environment, including data stream transmission, reliability, effective flow control, full plex operation and multiplexing. Through connection oriented, end-to-end and reliable packet delivery. Generally speaking, it is to open up a well connected channel for the data to be sent in advance, and then send the data; UDP does not provide reliability, flow control or error recovery for IP
blockchain is a new application mode of distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and other computer technologies. The so-called consensus mechanism is a mathematical algorithm to establish trust and obtain interests between different nodes in the blockchain system. Blockchain is equivalent to the Internet in the 1990s. Bitcoin, Puyin and other digital currencies are applications of blockchain.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750