FIELD: information protection.
SUBSTANCE: invention relates to a method and a system for organization of protected information exchange, using a blockchain technology and distributed data storage systems. In the method, a name of a database is entered, while additionally entering a password to this database. The presence of the database on a device is checked. In case of the presence of the database, it is decrypted using symmetric AES-256 encryption, the correctness of a database file is checked. In case of the absence of the database, a new database is created, while forming a password to the new database, required to encrypt and decrypt a file with the new database, using the AES-256 algorithm. The work with the database is completed, while, after checking for the correctness of the database file or after creating a new database, network services are launched, at least a client for requests from a central server for an up-to-date list of IP addresses on a network and sending a “hello message” is launched. A request processing server is launched to receive a hash of the last transaction and an up-to-date copy of the blockchain. A transaction processing server is launched to participate in the consensus process. After that, transaction hashes are requested from servers of all IP addresses available on the network. The current hash of the last transaction is selected according to the majority rule. A request is made to receive an up-to-date copy of the blockchain from one of senders of the current hash of the last transaction. An algorithm for analyzing the received up-to-date copy of the blockchain is launched. A list of added users is displayed. At least one of functions is selected: addition of a new user, view of the history of correspondence with the specified user and sending to this user of a text message, view of the history of correspondence with the specified user and sending to this user of a text file up to 1 KB in size, update of an encryption key for the specified user, sending of a file to a distributed storage, request for a file from the distributed storage, update of an information display interface, safe logout of a system, which the system needs to perform. The fact that the safe logout function is selected is checked. If this function is not selected, then, the selected function is performed, while, after performing the selected function, a new function is selected. If the safe logout function is selected, then, the database is encrypted using the previously entered password, using the AES-256 algorithm.
EFFECT: provision of protected information exchange.
10 cl, 14 dwg
Authors
Dates
2022-10-21—Published
2021-02-09—Filed