计算机科学 ›› 2020, Vol. 47 ›› Issue (6A): 634-638.doi: 10.11896/JsJkx.190600075

• 交叉&应用 • 上一篇    下一篇

基于区块链与人工智能的网络多服务器SIP信息加密系统设计

任仪   

  1. 河南省人民医院 郑州 450000
  • 发布日期:2020-07-07
  • 通讯作者: 任仪(147060458@qq.com)
  • 基金资助:
    河南省科技攻关计划项目门诊预约挂号自助软件平台研究

Design of Network Multi-server SIP Information Encryption System Based on Block Chain and Artificial Intelligence

REN Yi   

  1. Henan Provincial Peoples Hospital,Zhengzhou 450000,China
  • Published:2020-07-07
  • About author:REN Yi, born in 1985, undergraduate, engineer, is a member of China ComputerFederation.His main research interests include hospital informatization and so on.
  • Supported by:
    This work was supported by the Application of Self-service Software Platform Outpatient Appointment Registration.

摘要: 采用传统加密系统只能实现单个信息共享,无法保证多个信息共享安全,为了解决该问题,文中提出并设计了基于区块链与人工智能的网络多服务器SIP信息加密系统。在网络多服务器SIP条件下,设计USB模块,在该模块中安置状态寄存器静态转换开关,判断USB信息存储状态,在USB模块中搭建信息接口,使用A/D转换器进行信号转换,为任务调度提供基本信息传输信号。添加调度规则,将经过调度的信息分成若干个数据块,依据锁盒思想,使用功能调用函数集合检查访问权限,生成认证密钥,设计加密执行模块,按照时间顺序将分解的信息以一定顺序组合成链式数据结构,通过计算最初数据矩阵,获取初始指纹,依据该指纹设计具体加密执行方案,通过区块链与人工智能技术实现信息的加密。通过实验对比结果可知,该系统的信息传输完整性较高,具有良好加密效果,且该系统的读写效率始终保持在90%以上,增加了信息的读写效率。

关键词: USB, 调度规则, 加密, 区块链, 人工智能, 网络多服务器SIP, 移动agent技术

Abstract: The traditional encryption system can only realize single information sharing and can not guarantee the security of multiple information sharing.In order to solve this problem,network multi-server SIP information encryption system based on block chain and artificial intelligence was put forward and designed.Under the condition of network multi-server SIP,USB module is designed and a state register static switch is installed in the module to Judge the storage state of USB information,build information interface in the USB module,and use A/D converter for signal conversion,to provide basic information transmission signals for task dispatching.Add dispatching rules,divide the dispatched information into several data blocks.According to the lock box idea,use the function call function set to check the access rights,generate the authentication secret key,design the encryption execution module,according to the time sequence,combine the decomposed information into chain data structure in a certain order,to get the initial fingerprint by calculating the initial data matrix,specifically and secretly execute scheme according to the fingerprint design,and realize the information encryption through block chain and artificial intelligence technology.Experimental comparison results show that the system has high information transmission integrity and good encryption effect,and the reading and writing efficiency of the system is always maintained at 90% and above,which increases the reading and writing efficiency of information.

Key words: Artificial intelligence, Block chain technology, Encryption, Mobile agent technology, Network multi-server SIP, Scheduling rules, USB

中图分类号: 

  • TP309
[1] SUN J G.Prospects for the development of blockchain technology .China Finance,2016,262(8):23-24.
[2] LI M,TANG Y.Design and Implementation of Distributed Web Search Model Based on Mobile Agent.Computer Applications and Software,2016,33(4):18-21.
[3] LI X G,SHEN Y L,KANG X Q.Hyper-chaotic two-way authentication private information security encryption algorithm .Science bulletin,2017,33(8):152-155.
[4] ZHANG X W,LI H K,YANG Y T,et al.Personal information privacy protection logistics system based on two-dimensional code technology.Computer Applications Research,2016,33(11):3455-3459.
[5] CHEN W X,ZHANG T J,LIN J Q,et al.Mobile Agent Based Opportunity Opportunity Transmission Control Method.Journal of Jiangsu University(Natural Science Edition),2018,39(3):66-72.
[6] GUO S N,JIANG X Q.Design of Information Encryption and Decryption System for Emergency Communication Network.Modern Electronic Technology,2017,40(17):94-97.
[7] WANG Z D,WANG G,LI Y C,et al.IEC 61850-9-2LE message encryption method based on micro-encryption algorithm.Power System Automation,2016,18(4):121-127.
[8] ZHANG B,WANG H.A dynamic packet encryption scheme based on mobile communication device authentication .Electronic Design Engineering,2018,26(22):68-71.
[9] MA W W.Esearch on Security Encryption of Information Col-lection under Mobile Internet.Electronic Design Enginee-ring,2018,26(23):52-56.
[10] JIANG D D,SHANG Y L,TIAN Y,et al.Construction of electronic warehouse single flow platform based on blockchain.Journal of Xi’an Engineering University,2017,31(6):828-834.
[11] CAI K.Magos AI proJect brings artificial intelligence and neural network technology to the blockchain field .Computer & Network,2017,43(18):77.
[12] ZHOU R M,ZHANG W X.Analysis on Risks and Control of Financial Technology Innovation-Based on Big Data,Artificial Intelligence and Blockchain Research.China Management Information Technology,2017(19):33-36.
[13] PAN J F,HUANG D C.Influence of Blockchain Technology on Artificial Intelligence.Computer Science,2018,45(S2):53-57.
[14] XIE W.GMIC Global Financial Innovation Summit:When Big Data,Artificial Intelligence,Blockchain Technology Meets Finance .China Economic Weekly,2016(18):50-51.
[15] PENG J J,LONG R L.Research on Key Technologies of Security Protection in Blockchain Application Environment.Network Security Technology and Application,2018,210(6):29-36.
[16] YANG M J.Design of Data Transaction Platform Based on Password and Blockchain Technology.Information and Communication Technology,2016(4):24-31.
[17] TIAN H B,HE J J,FU L Q.Privacy Protection Fair Contract Signing Agreement Based on Public Blockchain.Journal of Cryptography,2017,4(2):97-108.
[18] CHEN T,MA M,XU X L.Application Research of Blockchain in Information Sharing and Use of Smart City.E-Government,2018,187(7):36-45.
[19] ZHOU J.Application of Mobile Agent Technology in Enterprise Network Management.Network Security Technology and Application,2017(6):155-156.
[20] YE X R,SHAO Q,XIAO R.Supply Chain Prototype System Based on Blockchain,Smart Contract and Internet of Things Based on Blockchain.Science & Technology Review,2017,35(23):62-69.
[1] 王子凯, 朱健, 张伯钧, 胡凯.
区块链与智能合约并行方法研究与实现
Research and Implementation of Parallel Method in Blockchain and Smart Contract
计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102
[2] 吕由, 吴文渊.
隐私保护线性回归方案与应用
Privacy-preserving Linear Regression Scheme and Its Application
计算机科学, 2022, 49(9): 318-325. https://doi.org/10.11896/jsjkx.220300190
[3] 王磊, 李晓宇.
基于随机洋葱路由的LBS移动隐私保护方案
LBS Mobile Privacy Protection Scheme Based on Random Onion Routing
计算机科学, 2022, 49(9): 347-354. https://doi.org/10.11896/jsjkx.210800077
[4] 周连兵, 周湘贞, 崔学荣.
基于双重二维混沌映射的压缩图像加密方案
Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map
计算机科学, 2022, 49(8): 344-349. https://doi.org/10.11896/jsjkx.210700235
[5] 周航, 姜河, 赵琰, 解相朋.
适用于各单元共识交易的电力区块链系统优化调度研究
Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit
计算机科学, 2022, 49(6A): 771-776. https://doi.org/10.11896/jsjkx.210600241
[6] 傅丽玉, 陆歌皓, 吴义明, 罗娅玲.
区块链技术的研究及其发展综述
Overview of Research and Development of Blockchain Technology
计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214
[7] 高健博, 张家硕, 李青山, 陈钟.
RegLang:一种面向监管的智能合约编程语言
RegLang:A Smart Contract Programming Language for Regulation
计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016
[8] 毛典辉, 黄晖煜, 赵爽.
符合监管合规性的自动合成新闻检测方法研究
Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance
计算机科学, 2022, 49(6A): 523-530. https://doi.org/10.11896/jsjkx.210300083
[9] 李博, 向海昀, 张宇翔, 廖浩德.
面向食品溯源场景的PBFT优化算法应用研究
Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios
计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018
[10] 王思明, 谭北海, 余荣.
面向6G可信可靠智能的区块链分片与激励机制
Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence
计算机科学, 2022, 49(6): 32-38. https://doi.org/10.11896/jsjkx.220400004
[11] 孙浩, 毛瀚宇, 张岩峰, 于戈, 徐石成, 何光宇.
区块链跨链技术发展及应用
Development and Application of Blockchain Cross-chain Technology
计算机科学, 2022, 49(5): 287-295. https://doi.org/10.11896/jsjkx.210800132
[12] 阳真, 黄松, 郑长友.
基于区块链与改进CP-ABE的众测知识产权保护技术研究
Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE
计算机科学, 2022, 49(5): 325-332. https://doi.org/10.11896/jsjkx.210900075
[13] 任畅, 赵洪, 蒋华.
一种量子安全拜占庭容错共识机制
Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism
计算机科学, 2022, 49(5): 333-340. https://doi.org/10.11896/jsjkx.210400154
[14] 秦小月, 黄汝维, 杨波.
基于素数幂次阶分圆环的NTRU型全同态加密方案
NTRU Type Fully Homomorphic Encryption Scheme over Prime Power Cyclotomic Rings
计算机科学, 2022, 49(5): 341-346. https://doi.org/10.11896/jsjkx.210300089
[15] 丛颖男, 王兆毓, 朱金清.
关于法律人工智能数据和算法问题的若干思考
Insights into Dataset and Algorithm Related Problems in Artificial Intelligence for Law
计算机科学, 2022, 49(4): 74-79. https://doi.org/10.11896/jsjkx.210900191
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!