计算机科学 ›› 2020, Vol. 47 ›› Issue (6A): 634-638.doi: 10.11896/JsJkx.190600075
任仪
REN Yi
摘要: 采用传统加密系统只能实现单个信息共享,无法保证多个信息共享安全,为了解决该问题,文中提出并设计了基于区块链与人工智能的网络多服务器SIP信息加密系统。在网络多服务器SIP条件下,设计USB模块,在该模块中安置状态寄存器静态转换开关,判断USB信息存储状态,在USB模块中搭建信息接口,使用A/D转换器进行信号转换,为任务调度提供基本信息传输信号。添加调度规则,将经过调度的信息分成若干个数据块,依据锁盒思想,使用功能调用函数集合检查访问权限,生成认证密钥,设计加密执行模块,按照时间顺序将分解的信息以一定顺序组合成链式数据结构,通过计算最初数据矩阵,获取初始指纹,依据该指纹设计具体加密执行方案,通过区块链与人工智能技术实现信息的加密。通过实验对比结果可知,该系统的信息传输完整性较高,具有良好加密效果,且该系统的读写效率始终保持在90%以上,增加了信息的读写效率。
中图分类号:
[1] SUN J G.Prospects for the development of blockchain technology .China Finance,2016,262(8):23-24. [2] LI M,TANG Y.Design and Implementation of Distributed Web Search Model Based on Mobile Agent.Computer Applications and Software,2016,33(4):18-21. [3] LI X G,SHEN Y L,KANG X Q.Hyper-chaotic two-way authentication private information security encryption algorithm .Science bulletin,2017,33(8):152-155. [4] ZHANG X W,LI H K,YANG Y T,et al.Personal information privacy protection logistics system based on two-dimensional code technology.Computer Applications Research,2016,33(11):3455-3459. [5] CHEN W X,ZHANG T J,LIN J Q,et al.Mobile Agent Based Opportunity Opportunity Transmission Control Method.Journal of Jiangsu University(Natural Science Edition),2018,39(3):66-72. [6] GUO S N,JIANG X Q.Design of Information Encryption and Decryption System for Emergency Communication Network.Modern Electronic Technology,2017,40(17):94-97. [7] WANG Z D,WANG G,LI Y C,et al.IEC 61850-9-2LE message encryption method based on micro-encryption algorithm.Power System Automation,2016,18(4):121-127. [8] ZHANG B,WANG H.A dynamic packet encryption scheme based on mobile communication device authentication .Electronic Design Engineering,2018,26(22):68-71. [9] MA W W.Esearch on Security Encryption of Information Col-lection under Mobile Internet.Electronic Design Enginee-ring,2018,26(23):52-56. [10] JIANG D D,SHANG Y L,TIAN Y,et al.Construction of electronic warehouse single flow platform based on blockchain.Journal of Xi’an Engineering University,2017,31(6):828-834. [11] CAI K.Magos AI proJect brings artificial intelligence and neural network technology to the blockchain field .Computer & Network,2017,43(18):77. [12] ZHOU R M,ZHANG W X.Analysis on Risks and Control of Financial Technology Innovation-Based on Big Data,Artificial Intelligence and Blockchain Research.China Management Information Technology,2017(19):33-36. [13] PAN J F,HUANG D C.Influence of Blockchain Technology on Artificial Intelligence.Computer Science,2018,45(S2):53-57. [14] XIE W.GMIC Global Financial Innovation Summit:When Big Data,Artificial Intelligence,Blockchain Technology Meets Finance .China Economic Weekly,2016(18):50-51. [15] PENG J J,LONG R L.Research on Key Technologies of Security Protection in Blockchain Application Environment.Network Security Technology and Application,2018,210(6):29-36. [16] YANG M J.Design of Data Transaction Platform Based on Password and Blockchain Technology.Information and Communication Technology,2016(4):24-31. [17] TIAN H B,HE J J,FU L Q.Privacy Protection Fair Contract Signing Agreement Based on Public Blockchain.Journal of Cryptography,2017,4(2):97-108. [18] CHEN T,MA M,XU X L.Application Research of Blockchain in Information Sharing and Use of Smart City.E-Government,2018,187(7):36-45. [19] ZHOU J.Application of Mobile Agent Technology in Enterprise Network Management.Network Security Technology and Application,2017(6):155-156. [20] YE X R,SHAO Q,XIAO R.Supply Chain Prototype System Based on Blockchain,Smart Contract and Internet of Things Based on Blockchain.Science & Technology Review,2017,35(23):62-69. |
[1] | 王子凯, 朱健, 张伯钧, 胡凯. 区块链与智能合约并行方法研究与实现 Research and Implementation of Parallel Method in Blockchain and Smart Contract 计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102 |
[2] | 吕由, 吴文渊. 隐私保护线性回归方案与应用 Privacy-preserving Linear Regression Scheme and Its Application 计算机科学, 2022, 49(9): 318-325. https://doi.org/10.11896/jsjkx.220300190 |
[3] | 王磊, 李晓宇. 基于随机洋葱路由的LBS移动隐私保护方案 LBS Mobile Privacy Protection Scheme Based on Random Onion Routing 计算机科学, 2022, 49(9): 347-354. https://doi.org/10.11896/jsjkx.210800077 |
[4] | 周连兵, 周湘贞, 崔学荣. 基于双重二维混沌映射的压缩图像加密方案 Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map 计算机科学, 2022, 49(8): 344-349. https://doi.org/10.11896/jsjkx.210700235 |
[5] | 周航, 姜河, 赵琰, 解相朋. 适用于各单元共识交易的电力区块链系统优化调度研究 Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit 计算机科学, 2022, 49(6A): 771-776. https://doi.org/10.11896/jsjkx.210600241 |
[6] | 傅丽玉, 陆歌皓, 吴义明, 罗娅玲. 区块链技术的研究及其发展综述 Overview of Research and Development of Blockchain Technology 计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214 |
[7] | 高健博, 张家硕, 李青山, 陈钟. RegLang:一种面向监管的智能合约编程语言 RegLang:A Smart Contract Programming Language for Regulation 计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016 |
[8] | 毛典辉, 黄晖煜, 赵爽. 符合监管合规性的自动合成新闻检测方法研究 Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance 计算机科学, 2022, 49(6A): 523-530. https://doi.org/10.11896/jsjkx.210300083 |
[9] | 李博, 向海昀, 张宇翔, 廖浩德. 面向食品溯源场景的PBFT优化算法应用研究 Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios 计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018 |
[10] | 王思明, 谭北海, 余荣. 面向6G可信可靠智能的区块链分片与激励机制 Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence 计算机科学, 2022, 49(6): 32-38. https://doi.org/10.11896/jsjkx.220400004 |
[11] | 孙浩, 毛瀚宇, 张岩峰, 于戈, 徐石成, 何光宇. 区块链跨链技术发展及应用 Development and Application of Blockchain Cross-chain Technology 计算机科学, 2022, 49(5): 287-295. https://doi.org/10.11896/jsjkx.210800132 |
[12] | 阳真, 黄松, 郑长友. 基于区块链与改进CP-ABE的众测知识产权保护技术研究 Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE 计算机科学, 2022, 49(5): 325-332. https://doi.org/10.11896/jsjkx.210900075 |
[13] | 任畅, 赵洪, 蒋华. 一种量子安全拜占庭容错共识机制 Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism 计算机科学, 2022, 49(5): 333-340. https://doi.org/10.11896/jsjkx.210400154 |
[14] | 秦小月, 黄汝维, 杨波. 基于素数幂次阶分圆环的NTRU型全同态加密方案 NTRU Type Fully Homomorphic Encryption Scheme over Prime Power Cyclotomic Rings 计算机科学, 2022, 49(5): 341-346. https://doi.org/10.11896/jsjkx.210300089 |
[15] | 丛颖男, 王兆毓, 朱金清. 关于法律人工智能数据和算法问题的若干思考 Insights into Dataset and Algorithm Related Problems in Artificial Intelligence for Law 计算机科学, 2022, 49(4): 74-79. https://doi.org/10.11896/jsjkx.210900191 |
|