CN114116904A - Asset account chain storage system and method for information security - Google Patents

Asset account chain storage system and method for information security Download PDF

Info

Publication number
CN114116904A
CN114116904A CN202111413137.6A CN202111413137A CN114116904A CN 114116904 A CN114116904 A CN 114116904A CN 202111413137 A CN202111413137 A CN 202111413137A CN 114116904 A CN114116904 A CN 114116904A
Authority
CN
China
Prior art keywords
asset
electric power
information
security
storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111413137.6A
Other languages
Chinese (zh)
Inventor
郭静
黄伟
周超
王梓莹
姜海涛
顾智敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd
Original Assignee
Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd filed Critical Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd
Priority to CN202111413137.6A priority Critical patent/CN114116904A/en
Publication of CN114116904A publication Critical patent/CN114116904A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Strategic Management (AREA)
  • Public Health (AREA)
  • Water Supply & Treatment (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Computer Hardware Design (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Bioethics (AREA)
  • Data Mining & Analysis (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses an asset ledger chain storage system and method for information security. The system is based on a block chain technology and comprises an asset standing book chain storage module, an asset supervision life cycle management module and an operation and maintenance reinforcement work ticket log chain module. The asset account uplink storage module is used for acquiring information security fingerprint information in power asset security supervision and carrying out uplink storage, acquiring intermediate-state unstructured data in the power asset security supervision and carrying out uplink storage, the supervision asset full-life-cycle management module is used for acquiring full-life-cycle information of power assets and carrying out uplink storage, and the operation and maintenance reinforcement work ticket log uplink module is used for acquiring asset change logs generated in daily operation and maintenance of the power assets and carrying out uplink storage, so that data security traceability of the asset account is realized, the full-life-cycle information is clear and accurate and cannot be randomly tampered by any person, and the supervision work execution credibility is accurately and effectively realized.

Description

Asset account chain storage system and method for information security
Technical Field
The application relates to the technical field of electric power information security, in particular to an asset account chain storage system and method for information security.
Background
The safety supervision is used as a basic work of information safety supervision, and relates to a plurality of main bodies such as management departments, supervision units, provincial and municipal secondary operation and maintenance units, research and development units and the like, service information interaction such as supervision monthly reports, risk investigation, rectification feedback and the like is frequent between the main bodies, and operation and maintenance records and asset accounts are not allowed to be modified randomly.
Safety supervision service covers multiple fields such as information communication, scheduling, operation and inspection, marketing and the like, due to the lack of credible log records, safety events are difficult to trace to the source, the management and analysis of event logs are insufficient, supervision personnel cannot judge the source and reliability of data, and the credible quantification of the data safety tracing and supervision work execution is difficult.
Disclosure of Invention
The application discloses an asset ledger chain storage system and method for information security, and aims to solve the technical problems that in the prior art, data security tracing and work execution credibility and quantification are difficult in security supervision.
The first aspect of the application discloses an asset account chain upper storage system facing information safety, which is based on a block chain technology and comprises an asset account chain upper storage module, an asset whole life cycle supervision management module and an operation and maintenance reinforcement work ticket log chain upper module;
the asset account uplink storage module is used for acquiring information security fingerprint information in electric power asset security supervision and performing uplink storage, and acquiring intermediate-state unstructured data in the electric power asset security supervision and performing uplink storage;
the supervising asset full life cycle management module is used for acquiring full life cycle information of the electric power asset and performing uplink storage;
and the operation and maintenance reinforcement work ticket log chaining module is used for acquiring an asset change log generated in daily operation and maintenance of the power asset and performing chaining storage.
Optionally, the asset account uplink storage module includes:
and the Hash value uplink unit is used for performing uplink storage on the intermediate-state unstructured data in a Hash value uplink mode, and is used for ensuring the integrity of the intermediate-state unstructured data and simultaneously facilitating the acquisition and verification of the intermediate-state unstructured data.
Optionally, the supervising asset full life cycle management module is further configured to perform safety detection before the electric power asset is on-line, safe operation of the electric power asset, and offline of the electric power asset destruction for three time spans, so as to implement full life cycle management of the electric power asset.
Optionally, the supervising asset life cycle management module includes:
and the safety detection unit before the power asset is on-line is used for storing the black box test, the white box test and the penetration test of the power asset, and performing uplink storage on the corresponding test report and the power asset safety test score.
Optionally, the supervising asset life cycle management module includes:
the electric power asset safe operation unit is used for monitoring the safe operation of the electric power asset in all weather by utilizing network space mapping, automatic penetration and a server baseline probe, recording a safety event generated in the safe operation of the electric power asset, simultaneously grading the electric power asset to determine a grading condition, and determining whether the electric power asset is off-line or not according to the preset importance level and the grading condition of the electric power asset, wherein the safety event generated in the safe operation of the electric power asset comprises an unregistered IP (Internet protocol), a port and a potential safety hazard event.
Optionally, the information security fingerprint information includes key information, a person in charge, an IP address, and a port.
Optionally, the intermediate-state unstructured data includes a safety test report and a safety penetration report in the electric power asset safety supervision.
Optionally, the full life cycle information includes a deployment area, a baseline status, a protection policy, a software version, and an update record.
Optionally, the asset change log includes a work time, a work result, an influence range, and a worker.
The second aspect of the present application discloses an information security-oriented asset ledger chain storage method, which is based on a blockchain technology and includes:
acquiring information security fingerprint information in electric power asset security supervision and performing uplink storage, and acquiring intermediate-state unstructured data in the electric power asset security supervision and performing uplink storage;
acquiring full life cycle information of the electric power assets and performing uplink storage;
and acquiring an asset change log generated in the daily operation and maintenance of the power asset and performing uplink storage.
Optionally, the obtaining intermediate-state unstructured data in the electric power asset security supervision and performing uplink storage includes:
and performing uplink storage on the intermediate-state unstructured data in a hash value uplink mode, so that the integrity of the intermediate-state unstructured data is ensured, and meanwhile, the intermediate-state unstructured data is conveniently acquired and verified.
Optionally, the method further comprises three time spans of safety detection before the electric power asset is on-line, safe operation of the electric power asset and destruction and off-line of the electric power asset, so as to realize full life cycle management of the electric power asset.
Optionally, before the electric power asset is brought on line, the electric power asset is safely detected, safely operated and destroyed, and the electric power asset is taken off line for three time spans, so as to realize the full life cycle management of the electric power asset, including:
and in the black box test, the white box test and the penetration test of the stored electric power assets, corresponding test reports and electric power asset safety test scores are stored, and uplink storage is carried out.
Optionally, before the electric power asset is brought on line, the electric power asset is safely detected, safely operated and destroyed, and the electric power asset is taken off line for three time spans, so as to realize the full life cycle management of the electric power asset, including:
monitoring the safe operation of the electric power assets all weather by utilizing network space mapping, automatic penetration and a server baseline probe, recording safety events generated in the safe operation of the electric power assets, simultaneously grading the electric power assets to determine a grading condition, and determining whether the assets with potential safety hazards are off line or not according to preset importance levels and the grading condition of the electric power assets, wherein the safety events generated in the safe operation of the electric power assets comprise unregistered IP (Internet protocol), ports and potential safety hazard events.
The application discloses an asset ledger chain storage system and method for information security. The system is based on a block chain technology and comprises an asset standing book chain storage module, an asset supervision life cycle management module and an operation and maintenance reinforcement work ticket log chain module. The asset account uplink storage module is used for acquiring information security fingerprint information in power asset security supervision and carrying out uplink storage, acquiring intermediate-state unstructured data in the power asset security supervision and carrying out uplink storage, the supervision asset full-life-cycle management module is used for acquiring full-life-cycle information of power assets and carrying out uplink storage, and the operation and maintenance reinforcement work ticket log uplink module is used for acquiring asset change logs generated in daily operation and maintenance of the power assets and carrying out uplink storage, so that data security traceability of the asset account is realized, the full-life-cycle information is clear and accurate and cannot be randomly tampered by any person, and the supervision work execution credibility is accurately and effectively realized.
Drawings
In order to more clearly explain the technical solution of the present application, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious to those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of an asset ledger chain storage system oriented to information security according to an embodiment of the present application;
fig. 2 is a schematic view of an uplink storage of an information security-oriented asset account chain storage system according to an embodiment of the present application;
fig. 3 is a schematic flowchart of a process of building a supervision asset life cycle management module in an asset ledger chain storage system for information security according to an embodiment of the present application;
fig. 4 is a schematic work flow diagram of an information security-oriented asset ledger chain storage method according to an embodiment of the present application.
Detailed Description
In order to solve the technical problem that in the prior art, data security tracing and supervision work execution credibility quantification in security supervision are difficult, the application discloses an asset account chain upper storage system and method for information security through the following two embodiments.
Referring to fig. 1, a first embodiment of the present application discloses an asset account chain upper storage system oriented to information security, which is based on a block chain technology and includes an asset account chain upper storage module, an asset supervision life cycle management module, and an operation and maintenance reinforcement work ticket log upper chain module.
Referring to fig. 2, the main units stored in the chain are blocks, and all information that occurs to the power asset after the last block is formed and before the block is created is recorded on each block to ensure the integrity of data. And adding the new block into the last of the block chain after the new block is generated, so that the data record of the block can not be changed or deleted any more, and the consistency of the data is ensured, namely the asset account information can not be tampered. The main body unit stored on the power asset storage chain is a block, and the block is divided into a block head part and a block body part. The block header mainly comprises a parent block hash value, a version, a timestamp, difficulty, Nonce, a Merkle root and the like. The block contains structured data and unstructured data of the supervising system. The structured data part is information security fingerprint information, namely key information, a responsible person, an IP address and a port related in security supervision such as potential safety hazards of electric power assets, and the intermediate state unstructured data part mainly comprises documents such as a security test report and a security penetration report. Recorded on each block is all information that occurs after the last block was formed before the block was created to ensure data integrity. And adding the new block into the last of the block chain after the new block is generated, so that the data record of the block can not be changed or deleted any more, and the consistency of the data is ensured through verification of the authenticity of the block chain identity, namely the asset standing book information can not be tampered.
The asset standing book cochain storage module 10 is used for acquiring information security fingerprint information in electric power asset security supervision and carrying out cochain storage, and acquiring intermediate-state unstructured data in electric power asset security supervision and carrying out cochain storage.
Further, the information security fingerprint information includes key information, a person in charge, an IP address and a port.
Further, the intermediate-state unstructured data comprises a safety test report and a safety penetration report in the electric power asset safety supervision.
Specifically, the asset account uplink storage module 10 is configured to store, as the asset account uplink of the block chain, key information, information security fingerprint information such as a responsible person, an IP address, and a port, and intermediate unstructured data such as a security test report and a security penetration report, which are involved in security supervision of potential safety hazards of the electric power assets. The nodes of the whole network are maintained together, so that the whole life cycle information of the machine account can be guaranteed to be accurate and credible, and can not be tampered by any personnel at will.
In some embodiments of the present application, the asset ledger chain storage module 10 includes:
and the Hash value uplink unit is used for performing uplink storage on the intermediate-state unstructured data in a Hash value uplink mode, and is used for ensuring the integrity of the intermediate-state unstructured data and simultaneously facilitating the acquisition and verification of the intermediate-state unstructured data.
Particularly, considering that a large amount of storage space is needed for intermediate unstructured data, namely a safety test report and a safety penetration report, of power grid information safety supervision, and the characteristic that the data are not frequently modified, the data are in a Hash value uplink mode, so that the integrity of the data is guaranteed, meanwhile, the unstructured data can be conveniently obtained and verified, and the reliability of a power asset storage chain is guaranteed.
And the supervising asset life cycle management module 20 is used for acquiring the life cycle information of the power assets and performing uplink storage.
Further, the full life cycle information includes a deployment area, a baseline status, a protection policy, a software version, and an update record.
Specifically, the supervised asset life cycle management module 20 brings running devices, systems, applications and the like in the areas such as the internet area, the security access area, the information management area and the like into the supervised asset life cycle management system, and uses the blockchain record management to the non-sensitive data such as the deployment area, the baseline current situation, the protection policy, the software version, the update record and the like of the asset from the perspective of the life cycle.
In some embodiments of the present application, the supervising asset full life cycle management module 20 is further configured to perform safety detection, safety operation of the electric power asset, and destruction of the electric power asset for three time spans before the electric power asset is brought on line, so as to implement full life cycle management of the electric power asset.
In some embodiments of the present application, the supervising asset full lifecycle management module 20 comprises:
and the safety detection unit before the power asset is on-line is used for storing the black box test, the white box test and the penetration test of the power asset, and performing uplink storage on the corresponding test report and the power asset safety test score.
In some embodiments of the present application, the supervising asset full lifecycle management module 20 comprises:
the electric power asset safe operation unit is used for monitoring the safe operation of the electric power asset in all weather by utilizing network space mapping, automatic penetration and a server baseline probe, recording a safety event generated in the safe operation of the electric power asset, simultaneously grading the electric power asset to determine a grading condition, and determining whether the electric power asset is off-line or not according to the preset importance level and the grading condition of the electric power asset, wherein the safety event generated in the safe operation of the electric power asset comprises an unregistered IP (Internet protocol), a port and a potential safety hazard event. In this way, safe operation of the power asset can be ensured.
The operation and maintenance reinforcement work ticket log chaining module 30 is configured to obtain an asset change log generated in daily operation and maintenance of the power asset and perform chaining storage.
In the information asset operation process, an asset account information change work ticket business exists, and the work ticket marks asset change information, operation time and operation personnel. After receiving the asset change work ticket request, the supervising system stores the work ticket information and the system time node for executing the contract into the intelligent contract execution variable, further executes the automatic execution of the intelligent contract of the block chain, and writes the changed asset account information into the block chain after the operation and maintenance operation is completed, so that the asset information can be traced, and the content is accurate and reliable.
Further, the asset change log includes a work time, a work result, an influence range, and a worker.
The method comprises the steps of establishing an asset chaining operation track event according to information such as operation time, operation results, influence ranges and operating personnel, standardizing an information security supervision system and avoiding private establishment and private opening behaviors.
The asset account chain upper storage system for information security disclosed by the embodiment of the application is based on a block chain technology and comprises an asset account chain upper storage module, an asset whole life cycle supervision management module and an operation and maintenance reinforcement work ticket log chain upper module. The asset account uplink storage module is used for acquiring information security fingerprint information in power asset security supervision and carrying out uplink storage, acquiring intermediate-state unstructured data in the power asset security supervision and carrying out uplink storage, the supervision asset full-life-cycle management module is used for acquiring full-life-cycle information of power assets and carrying out uplink storage, and the operation and maintenance reinforcement work ticket log uplink module is used for acquiring asset change logs generated in daily operation and maintenance of the power assets and carrying out uplink storage, so that data security traceability of the asset account is realized, the full-life-cycle information is clear and accurate and cannot be randomly tampered by any person, and the supervision work execution credibility is accurately and effectively realized.
In some embodiments of the present application, the building steps of the information security-oriented asset ledger chain storage system are as follows:
and designing and building a block chain network, wherein the main functions of the block chain network are asset ledger block production, intelligent contract execution supervision and asset risk quantitative analysis. And initializing configuration work quantitative evaluation configuration rules, intelligent contract rules and a supervising chain browser.
Designing and building an asset account uplink storage module, performing asset account uplink, acquiring information such as a periodic test report, a development unit, a demand unit, a submission unit, a system risk level, a system risk score and the like of an asset based on code security test management platform data, and realizing storage on an asset account chain by using a block chain information transfer mechanism and a DPOS (distributed data operating system) consensus signature mechanism.
Designing and building a management module for supervising the whole life cycle of the assets, referring to fig. 3, when the information such as the asset deployment area, the current situation of the baseline, the update record, the protection strategy and the like changes, the changed state can be automatically linked and stored. The supervising system acquires system fingerprint information through the data probe, compares the system fingerprint information with information security fingerprint information stored on a chain, and links and stores the difference fingerprint information when finding that the information security fingerprint information is not matched (the problems of inconsistency of an un-documented illegally deployed system, an unknown port and a system version and the like) or finding a hidden trouble of a leak. Related operating personnel can link the correction update records for storage after correction, and the system can verify the correction condition and realize the asset life cycle management.
Designing and building an operation and maintenance reinforcement work ticket log chaining module, generating an asset information change work ticket business log in the information asset operation process, wherein the log indicates operation time, operation results, an influence range and operation personnel. When the block chain supervising system receives the asset change work ticket request, the work ticket information and the time node for executing the contract are stored in the intelligent contract execution variable, and after the operation and maintenance operation is completed, the work ticket log information is written into the block chain, so that the asset information is not easy to be tampered, traceable, accurate and credible.
For the content that is not disclosed in detail in the method embodiments of the present application, please refer to the system embodiments of the present application.
A second embodiment of the present application discloses an information security-oriented asset ledger chain storage method, referring to fig. 4, the information security-oriented asset ledger chain storage method is based on a block chain technology, and includes:
step S401, information security fingerprint information in the electric power asset security supervision is obtained and uplink storage is carried out, and intermediate state unstructured data in the electric power asset security supervision is obtained and uplink storage is carried out.
Further, the acquiring intermediate-state unstructured data in the electric power asset security supervision and performing uplink storage includes:
and performing uplink storage on the intermediate-state unstructured data in a hash value uplink mode, so that the integrity of the intermediate-state unstructured data is ensured, and meanwhile, the intermediate-state unstructured data is conveniently acquired and verified.
Step S402, acquiring the full life cycle information of the electric power assets and performing uplink storage.
Step S403, acquiring an asset change log generated in the daily operation and maintenance of the power asset, and performing uplink storage.
In some embodiments of the application, the information security-oriented asset ledger chain on-storage method further includes three time spans of safety detection, electric power asset safety operation and electric power asset destruction off-line before the electric power asset is on-line, so that the full life cycle management of the electric power asset is realized.
Further, from three time spans of before electric power asset comes online safety inspection, electric power asset safe operation and electric power asset destruction, realize the full life cycle management to electric power asset, include:
and in the black box test, the white box test and the penetration test of the stored electric power assets, corresponding test reports and electric power asset safety test scores are stored, and uplink storage is carried out.
Further, from three time spans of before electric power asset comes online safety inspection, electric power asset safe operation and electric power asset destruction, realize the full life cycle management to electric power asset, include:
monitoring the safe operation of the electric power assets all weather by utilizing network space mapping, automatic penetration and a server baseline probe, recording safety events generated in the safe operation of the electric power assets, simultaneously grading the electric power assets to determine a grading condition, and determining whether the assets with potential safety hazards are off line or not according to preset importance levels and the grading condition of the electric power assets, wherein the safety events generated in the safe operation of the electric power assets comprise unregistered IP (Internet protocol), ports and potential safety hazard events.
The present application has been described in detail with reference to specific embodiments and illustrative examples, but the description is not intended to limit the application. Those skilled in the art will appreciate that various equivalent substitutions, modifications or improvements may be made to the presently disclosed embodiments and implementations thereof without departing from the spirit and scope of the present disclosure, and these fall within the scope of the present disclosure. The protection scope of this application is subject to the appended claims.

Claims (10)

1. An information security-oriented asset account chain on-storage system is characterized in that the information security-oriented asset account chain on-storage system is based on a block chain technology and comprises an asset account chain on-storage module, an asset whole life cycle supervision management module and an operation and maintenance reinforcement work ticket log chain on-storage module;
the asset account uplink storage module is used for acquiring information security fingerprint information in electric power asset security supervision and performing uplink storage, and acquiring intermediate-state unstructured data in the electric power asset security supervision and performing uplink storage;
the supervising asset full life cycle management module is used for acquiring full life cycle information of the electric power asset and performing uplink storage;
and the operation and maintenance reinforcement work ticket log chaining module is used for acquiring an asset change log generated in daily operation and maintenance of the power asset and performing chaining storage.
2. The information security-oriented asset ledger-chain storage system of claim 1, wherein the asset ledger-chain storage module comprises:
and the Hash value uplink unit is used for performing uplink storage on the intermediate-state unstructured data in a Hash value uplink mode, and is used for ensuring the integrity of the intermediate-state unstructured data and simultaneously facilitating the acquisition and verification of the intermediate-state unstructured data.
3. The information security-oriented asset standing book chain storage system according to claim 1, wherein the supervising asset full life cycle management module is further configured to perform safety detection before the electric power asset is brought on line, perform safe operation on the electric power asset, and perform destruction and offline for three time spans to realize full life cycle management on the electric power asset.
4. The information security-oriented asset ledger-chain storage system of claim 3, wherein the supervising asset full-life-cycle management module comprises:
and the safety detection unit before the power asset is on-line is used for storing a corresponding test report and a corresponding power asset safety test score in a black box test, a white box test and a penetration test of the power asset, and performing uplink storage.
5. The information security-oriented asset ledger-chain storage system of claim 3, wherein the supervising asset full-life-cycle management module comprises:
the electric power asset safe operation unit is used for monitoring the safe operation of the electric power asset in all weather by utilizing network space mapping, automatic penetration and a server baseline probe, recording a safety event generated in the safe operation of the electric power asset, simultaneously grading the electric power asset to determine a grading condition, and determining whether the electric power asset is off-line or not according to the preset importance level and the grading condition of the electric power asset, wherein the safety event generated in the safe operation of the electric power asset comprises an unregistered IP (Internet protocol), a port and a potential safety hazard event.
6. The information security-oriented asset ledger-chain storage system of claim 1, wherein the information security fingerprint information comprises key information, principals, IP addresses and ports.
7. The information security-oriented asset ledger-chain storage system of claim 1, wherein the intermediate-state unstructured data comprises security test reports and security penetration reports in power asset security oversight.
8. The information security-oriented asset ledger-chain storage system of claim 1, wherein the full lifecycle information includes deployment area, baseline presence, protection policies, software versions, and update records.
9. The information security-oriented asset ledger-chain storage system according to claim 1, characterized in that the asset change log includes work time, work result, influence range, and work personnel.
10. An information security-oriented asset standing book chain storage method is characterized in that the information security-oriented asset standing book chain storage method is based on a block chain technology and comprises the following steps:
acquiring information security fingerprint information in electric power asset security supervision and performing uplink storage, and acquiring intermediate-state unstructured data in the electric power asset security supervision and performing uplink storage;
acquiring full life cycle information of the electric power assets and performing uplink storage;
and acquiring an asset change log generated in the daily operation and maintenance of the power asset and performing uplink storage.
CN202111413137.6A 2021-11-25 2021-11-25 Asset account chain storage system and method for information security Pending CN114116904A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111413137.6A CN114116904A (en) 2021-11-25 2021-11-25 Asset account chain storage system and method for information security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111413137.6A CN114116904A (en) 2021-11-25 2021-11-25 Asset account chain storage system and method for information security

Publications (1)

Publication Number Publication Date
CN114116904A true CN114116904A (en) 2022-03-01

Family

ID=80373048

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111413137.6A Pending CN114116904A (en) 2021-11-25 2021-11-25 Asset account chain storage system and method for information security

Country Status (1)

Country Link
CN (1) CN114116904A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115114314A (en) * 2022-08-29 2022-09-27 北京微芯区块链与边缘计算研究院 Data probe-based data detection and extraction method and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115114314A (en) * 2022-08-29 2022-09-27 北京微芯区块链与边缘计算研究院 Data probe-based data detection and extraction method and system

Similar Documents

Publication Publication Date Title
Kumar et al. Adversarial machine learning-industry perspectives
CN110535938B (en) Data processing method, equipment and storage medium based on intelligent contract
CN108520464B (en) Real-time automatic supervision reporting system based on traditional block chain
Linger et al. Requirements definition for survivable network systems
US9202183B2 (en) Auditing system and method
CN109583711B (en) Safety risk assessment overall process management system
US20100115601A1 (en) Method and an apparatus for assessing a security of a component and a corresponding system
CN105975863A (en) Method for evaluating and calculating information security risk of power distribution automation terminal equipment
CN113177730A (en) Water resource traceability management system
CN110971464A (en) Operation and maintenance automatic system suitable for disaster recovery center
CN112733147A (en) Equipment safety management method and system
CN112560046A (en) Method and device for evaluating service data security index
CN113315767A (en) Electric power Internet of things equipment safety detection system and method
CN110063042A (en) A kind of response method and its terminal of database failure
CN114116904A (en) Asset account chain storage system and method for information security
Alenazi et al. A novel approach to tracing safety requirements and state-based design models
CN111611590A (en) Method and device for data security related to application program
CN117150576B (en) Intelligent verification system and method for block chain electronic seal
CN112560111B (en) Time sequence data acquisition tamper-proofing method and device suitable for Internet of things
CN117544402A (en) Vulnerability management system based on network asset
KR101464736B1 (en) Security Assurance Management System and Web Page Monitoring Method
CN110955900A (en) Vulnerability detection method for big data platform
CN112200549B (en) Block chain link point verification method and payment verification platform applied to block chain payment
CN114003969A (en) Risk assessment method based on block chain technology
Павленко et al. Methodological foundation for improving the quality of intelligent decision-making system software

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination