Computer Science ›› 2020, Vol. 47 ›› Issue (6A): 634-638.doi: 10.11896/JsJkx.190600075

• Interdiscipline & Application • Previous Articles     Next Articles

Design of Network Multi-server SIP Information Encryption System Based on Block Chain and Artificial Intelligence

REN Yi   

  1. Henan Provincial Peoples Hospital,Zhengzhou 450000,China
  • Published:2020-07-07
  • About author:REN Yi, born in 1985, undergraduate, engineer, is a member of China ComputerFederation.His main research interests include hospital informatization and so on.
  • Supported by:
    This work was supported by the Application of Self-service Software Platform Outpatient Appointment Registration.

Abstract: The traditional encryption system can only realize single information sharing and can not guarantee the security of multiple information sharing.In order to solve this problem,network multi-server SIP information encryption system based on block chain and artificial intelligence was put forward and designed.Under the condition of network multi-server SIP,USB module is designed and a state register static switch is installed in the module to Judge the storage state of USB information,build information interface in the USB module,and use A/D converter for signal conversion,to provide basic information transmission signals for task dispatching.Add dispatching rules,divide the dispatched information into several data blocks.According to the lock box idea,use the function call function set to check the access rights,generate the authentication secret key,design the encryption execution module,according to the time sequence,combine the decomposed information into chain data structure in a certain order,to get the initial fingerprint by calculating the initial data matrix,specifically and secretly execute scheme according to the fingerprint design,and realize the information encryption through block chain and artificial intelligence technology.Experimental comparison results show that the system has high information transmission integrity and good encryption effect,and the reading and writing efficiency of the system is always maintained at 90% and above,which increases the reading and writing efficiency of information.

Key words: Artificial intelligence, Block chain technology, Encryption, Mobile agent technology, Network multi-server SIP, Scheduling rules, USB

CLC Number: 

  • TP309
[1] SUN J G.Prospects for the development of blockchain technology .China Finance,2016,262(8):23-24.
[2] LI M,TANG Y.Design and Implementation of Distributed Web Search Model Based on Mobile Agent.Computer Applications and Software,2016,33(4):18-21.
[3] LI X G,SHEN Y L,KANG X Q.Hyper-chaotic two-way authentication private information security encryption algorithm .Science bulletin,2017,33(8):152-155.
[4] ZHANG X W,LI H K,YANG Y T,et al.Personal information privacy protection logistics system based on two-dimensional code technology.Computer Applications Research,2016,33(11):3455-3459.
[5] CHEN W X,ZHANG T J,LIN J Q,et al.Mobile Agent Based Opportunity Opportunity Transmission Control Method.Journal of Jiangsu University(Natural Science Edition),2018,39(3):66-72.
[6] GUO S N,JIANG X Q.Design of Information Encryption and Decryption System for Emergency Communication Network.Modern Electronic Technology,2017,40(17):94-97.
[7] WANG Z D,WANG G,LI Y C,et al.IEC 61850-9-2LE message encryption method based on micro-encryption algorithm.Power System Automation,2016,18(4):121-127.
[8] ZHANG B,WANG H.A dynamic packet encryption scheme based on mobile communication device authentication .Electronic Design Engineering,2018,26(22):68-71.
[9] MA W W.Esearch on Security Encryption of Information Col-lection under Mobile Internet.Electronic Design Enginee-ring,2018,26(23):52-56.
[10] JIANG D D,SHANG Y L,TIAN Y,et al.Construction of electronic warehouse single flow platform based on blockchain.Journal of Xi’an Engineering University,2017,31(6):828-834.
[11] CAI K.Magos AI proJect brings artificial intelligence and neural network technology to the blockchain field .Computer & Network,2017,43(18):77.
[12] ZHOU R M,ZHANG W X.Analysis on Risks and Control of Financial Technology Innovation-Based on Big Data,Artificial Intelligence and Blockchain Research.China Management Information Technology,2017(19):33-36.
[13] PAN J F,HUANG D C.Influence of Blockchain Technology on Artificial Intelligence.Computer Science,2018,45(S2):53-57.
[14] XIE W.GMIC Global Financial Innovation Summit:When Big Data,Artificial Intelligence,Blockchain Technology Meets Finance .China Economic Weekly,2016(18):50-51.
[15] PENG J J,LONG R L.Research on Key Technologies of Security Protection in Blockchain Application Environment.Network Security Technology and Application,2018,210(6):29-36.
[16] YANG M J.Design of Data Transaction Platform Based on Password and Blockchain Technology.Information and Communication Technology,2016(4):24-31.
[17] TIAN H B,HE J J,FU L Q.Privacy Protection Fair Contract Signing Agreement Based on Public Blockchain.Journal of Cryptography,2017,4(2):97-108.
[18] CHEN T,MA M,XU X L.Application Research of Blockchain in Information Sharing and Use of Smart City.E-Government,2018,187(7):36-45.
[19] ZHOU J.Application of Mobile Agent Technology in Enterprise Network Management.Network Security Technology and Application,2017(6):155-156.
[20] YE X R,SHAO Q,XIAO R.Supply Chain Prototype System Based on Blockchain,Smart Contract and Internet of Things Based on Blockchain.Science & Technology Review,2017,35(23):62-69.
[1] LYU You, WU Wen-yuan. Privacy-preserving Linear Regression Scheme and Its Application [J]. Computer Science, 2022, 49(9): 318-325.
[2] WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354.
[3] ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong. Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map [J]. Computer Science, 2022, 49(8): 344-349.
[4] LI Li, HE Xin, HAN Zhi-jie. Review of Privacy-preserving Mechanisms in Crowdsensing [J]. Computer Science, 2022, 49(5): 303-310.
[5] QIN Xiao-yue, HUANG Ru-wei, YANG Bo. NTRU Type Fully Homomorphic Encryption Scheme over Prime Power Cyclotomic Rings [J]. Computer Science, 2022, 49(5): 341-346.
[6] LI Ye, CHEN Song-can. Physics-informed Neural Networks:Recent Advances and Prospects [J]. Computer Science, 2022, 49(4): 254-262.
[7] SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353.
[8] REN Hua, NIU Shao-zhang, WANG Mao-sen, YUE Zhen, REN Ru-yong. Homomorphic and Commutative Fragile Zero-watermarking Based on SVD [J]. Computer Science, 2022, 49(3): 70-76.
[9] GAO Shi-yao, CHEN Yan-li, XU Yu-lan. Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing [J]. Computer Science, 2022, 49(3): 313-321.
[10] LYU You, WU Wen-yuan. Linear System Solving Scheme Based on Homomorphic Encryption [J]. Computer Science, 2022, 49(3): 338-345.
[11] JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313.
[12] LIANG Jian, HE Jun-hui. H.264/AVC Video Encryption Based on Adaptive Permutation of Macroblock Coding Information [J]. Computer Science, 2022, 49(1): 314-320.
[13] ZHANG Sai-nan, LI Qian-mu. Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping [J]. Computer Science, 2022, 49(1): 353-358.
[14] CHAO Le-men, YIN Xian-long. AI Governance and System:Current Situation and Trend [J]. Computer Science, 2021, 48(9): 1-8.
[15] ZHANG Xiao-yan, LI Qin-wei, FU Fu-jie. Secret Verification Method of Blockchain Transaction Amount Based on Digital Commitment [J]. Computer Science, 2021, 48(9): 324-329.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!