Blockchain data security computing method
Glossary
Term definitionBlockchainA distributed database that uses cryptography to ensure data security and immutabilityData security computingThe technology of computing data and obtaining results without leaking the original dataTrusted computing environmentAn execution environment that provides hardware-level security to protect data and code from malware attacksIntel SGXIntel Software Guard Extensions, a trusted computing environment technologyIntel Attestation Service (IAS)Intel Attestation Service, a service for verifying the authenticity of SGX environment and codeCryptographic keyThe key used to encrypt and decrypt dataRandom numberUnpredictable randomly generated numberTransactionThe value transfer operation on the blockchainParticipantsEach entity involved in data security computingBlockchain nodeA node in the blockchain network responsible for verifying and storing transaction dataShort answer question
What is blockchain data security computing? What problem does it try to solve?
Blockchain data security computing refers to the technology of computing data on the blockchain and obtaining results without leaking the original data. It aims to solve privacy and security issues in the process of blockchain data sharing, such as preventing data leakage, tampering and abuse.
What role does the trusted computing environment play in blockchain data security computing?
The trusted computing environment provides hardware-level security, which can protect the data and code in the data security computing process from being attacked by malware, thereby enhancing the security of data security computing.
What do the "transaction encryption" and "transaction encryption result" mentioned in the patent refer to?
"Transaction encryption" refers to the use of encryption keys to encrypt the original transaction data to protect the confidentiality of the transaction data. "Transaction encryption result" refers to the result obtained after calculating the encrypted transaction data, which is also encrypted.
What is the role of the "random number" mentioned in the patent?
Random numbers are mainly used for key encryption and result encryption in patents. By using random numbers, the randomness of keys and results can be increased, thereby improving the security of data security computing.
How does the "trusted computing module" mentioned in the patent ensure data security computing?
The "trusted computing module" ensures that transaction encryption, decryption and data security computing processes are carried out in a secure environment by providing a trusted execution environment to prevent malware attacks and data leaks.
What are the "candidate list" and "selection request" mentioned in the patent?
"Candidate list" refers to the list of candidate nodes that support a specific trusted algorithm provided by the blockchain node based on the "selection request" proposed by the participating party. "Selection request" refers to a request sent by a participant to a blockchain node to request a list of candidate nodes that support a specific trusted algorithm.
How is the "trust verification" mentioned in the patent performed?
"Trust verification" is usually performed by a trusted third-party organization (such as Intel Attestation Service) on candidate nodes to verify whether their hardware and software environment meet security requirements.
What functions do the "encryption module" and "decryption module" mentioned in the patent have?
The "encryption module" is responsible for encrypting transaction data using an encryption key and generating encrypted transaction data. The "decryption module" is responsible for decrypting encrypted transaction data or encrypted result data using a decryption key.
In what scenarios are the "first module" and "second module" mentioned in the patent used?
The "first module" is used by the participant to send the encrypted transaction result to the blockchain node and instruct it to write the result to the blockchain. The "second module" is used by the blockchain node to receive the encrypted transaction result sent by the participant and perform data security calculation in the trusted computing module.
What does the "non-volatile computer-readable storage medium" mentioned in the patent refer to?
"Non-volatile computer-readable storage medium" refers to a storage device that can store data for a long time, such as a hard disk, flash memory, etc. In patents, it can be used to store program codes, keys and other data related to blockchain data security computing.
Thesis title
Compare and contrast blockchain data security solutions based on trusted computing environments and secure multi-party computing, and analyze their respective advantages and disadvantages and applicable scenarios.
Explore the challenges of blockchain data security computing in different application scenarios, such as cross-chain data security computing, large-scale data security computing, etc.
Design a blockchain data security computing solution based on patent technology, and analyze its security, efficiency and scalability.
Analyze the future development trend of blockchain data security computing and explore its impact on data privacy protection and data sharing.
Study the legal and ethical issues related to blockchain data security computing, such as data ownership, cross-border data flow, etc.