CN116418601B - Full-flow information security monitoring system based on block chain auxiliary verification - Google Patents

Full-flow information security monitoring system based on block chain auxiliary verification Download PDF

Info

Publication number
CN116418601B
CN116418601B CN202310681552.2A CN202310681552A CN116418601B CN 116418601 B CN116418601 B CN 116418601B CN 202310681552 A CN202310681552 A CN 202310681552A CN 116418601 B CN116418601 B CN 116418601B
Authority
CN
China
Prior art keywords
block chain
verification
information
feedback
port
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310681552.2A
Other languages
Chinese (zh)
Other versions
CN116418601A (en
Inventor
王欣晨
韦羽佳
胡胜洲
刘文浩
刘鹏
许志鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Information Science and Technology
Original Assignee
Nanjing University of Information Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Information Science and Technology filed Critical Nanjing University of Information Science and Technology
Priority to CN202310681552.2A priority Critical patent/CN116418601B/en
Publication of CN116418601A publication Critical patent/CN116418601A/en
Application granted granted Critical
Publication of CN116418601B publication Critical patent/CN116418601B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application discloses a full-flow information security monitoring system based on block chain auxiliary verification, which comprises: the system comprises a block chain auxiliary double-check monitoring module, a block chain feedback-intermediate decoding interpretation module, a block chain operation monitoring feedback module and a block chain master-slave check interaction module; by introducing a full-flow monitoring concept and through intermediate code and feedback code and block chain master-slave node distribution verification, full-flow monitoring is realized. In the system, when abnormal operation occurs, the system can be timely adjusted to perform perfect leakage repairing measures such as system reset and the like through the feedback code and the intermediate code, and when logic flow of transmitted data is wrong, the system is combined with master and slave check nodes of the block chain to perform correction. Therefore, the phenomena of authority penetration, override, wall surrounding and the like can be perfectly made up, and a feedback monitoring mechanism of operation and data flow is established, so that the information safety under the information access operation is ensured to the maximum extent.

Description

Full-flow information security monitoring system based on block chain auxiliary verification
Technical Field
The application relates to network security application of a blockchain, in particular to a full-flow information security monitoring system based on blockchain auxiliary verification.
Background
Network security, generally refers to the security of a computer network, and in fact may also refer to the security of a computer communication network. The computer communication network is a system for interconnecting a plurality of computers with independent functions through communication equipment and transmission media and realizing information transmission and exchange among the computers under the support of communication software. The computer network is a system in which a plurality of independent computer systems, terminal devices and data devices distributed in a region are connected by communication means for the purpose of sharing resources, and data exchange is performed under the control of a protocol. The fundamental purpose of computer networks is resource sharing, and communication networks are ways to realize network resource sharing, so that computer networks are secure, and corresponding computer communication networks must be secure, so that information exchange and resource sharing should be realized for network users.
However, the current network security still has a great vulnerability, especially in the case of information access, the network information security is always vulnerable to attack and intrusion. The current network security system is mainly composed of a firewall and related software and hardware, which establishes a security gateway between the Internet and the intranet, thereby protecting the intranet from illegal users. However, the phenomena of rights permeation, rights override, wall surrounding, data tampering and the like are all the problems that are difficult to solve by the firewall.
Disclosure of Invention
The application aims to: in order to overcome the defects in the prior art, the application provides a full-flow information security monitoring system based on block chain auxiliary verification, which realizes full-flow monitoring through intermediate code and feedback code and block chain master-slave node distribution verification.
The technical scheme is as follows: in order to achieve the above purpose, the application adopts the following technical scheme:
a full-flow information security monitoring system based on blockchain auxiliary verification, comprising:
the block chain auxiliary double-check monitoring module comprises: a first check port is arranged between the network interface and the information monitoring port, a bidirectional information flow monitor is adopted to interact with the block chain slave node, and a second check port arranged at the user terminal is mutually checked for ensuring the safety of the information flow;
block chain feedback-intermediate decoding interpretation module: after entering the user terminal and after finishing the information operation, adopting a feedback code and an intermediate code for verification, binding the user operation and the information security through the master-slave nodes of the block chain,
and the block chain operation monitoring feedback module: designing a block chain to perform feedback, analyzing and recording the execution result of each information operation, and generating a feedback code file for performing matching correction on future operation;
and the block chain master-slave verification interaction module realizes the cooperation of the whole system through the block chain master-slave nodes by using the verification codes of different nodes.
As a preferred embodiment of the present application: the information flow access path of the block chain auxiliary double-check monitoring module is specifically as follows: the data access application enters from the network interface, and enters the information monitoring port after passing through the verification of the first verification port, which means that the data access record has generated a corresponding access log at the information monitoring port; after log record is generated without errors, checking the log record with a feedback code file, and explaining the generation of the feedback code file in a block chain auxiliary double check monitoring module; after passing the check, the information flow enters the user terminal;
the auxiliary checking path of the block chain is as follows: the block chain slave node I carries out interactive inspection on the check information and the check port I, and the check port I sends the check information to the bidirectional information flow exchange monitor and the check port II after the check is correct; meanwhile, after the information flow enters the user terminal, the user terminal sends check information to the second check port according to the information flow attribute, and the second check port carries out interactive verification on the check information and the first check port, so that the information flow between the two checks is prevented from being tampered or invaded, and even if illegal operation is found; and the verification is passed through the second verification port, and the verification information is sent to the two-way information flow exchange monitor for recording and matched verification with the second block chain slave node.
As a preferred embodiment of the present application: the information flow access path in the block chain feedback-intermediate decoding interpretation module is specifically: the data access application enters the information security equipment from the user terminal, operation verification is carried out after information access operation permission is carried out, the information access is converted into an operation check code through the operation verification, the operation check code is sent to a block chain slave node IV, the block chain slave node IV converts the block chain information check code into an intermediate code file according to the block chain information check code and carries out operation through a feedback-intermediate code interpreter, and the intermediate code file is used for interpreting the intermediate code file into an executable command;
the auxiliary checking path of the block chain is as follows: the information security device receives the verification information of the block chain slave node III, and verifies the verification result of the information security device; and a feedback code file generated by the operation history record enters a feedback-intermediate code interpreter and intermediate code cooperation for interpretation through a block chain main node, and the generation of the feedback code file is illustrated in a block chain auxiliary double-check monitoring module, so that the intermediate code is ensured not to be tampered.
As a preferred embodiment of the present application: the information flow access path of the block chain operation monitoring feedback module is specifically as follows: after the generated intermediate code enters a feedback-intermediate code interpreter, the intermediate code is interpreted by combining a feedback code file returned by a block chain main node and is interpreted as an executable command to operate; after execution is completed, executing feedback is carried out, executing feedback sends executing feedback information to a third checking port, after checking to confirm that the feedback information is correct, the executing feedback sends the feedback information to an operation block chain operation monitoring feedback module, and a feedback code file is generated;
the auxiliary checking path of the block chain is as follows: in the third check port, the feedback information is checked with the blockchain slave node five.
As a preferred embodiment of the present application: the data interaction way in the block chain master-slave verification interaction module is specifically as follows: the data of the first block chain slave node is unidirectionally transmitted to the second block chain slave node; the second block chain slave node unidirectionally receives data of the first block chain slave node, and performs bidirectional interaction with the main block chain node to perform collaborative verification of the data; the data of a block chain master node is received in a unidirectional way by a block chain slave node three; the block chain slave node IV performs bidirectional interaction with the block chain master node, and performs collaborative verification of data; the slave node five of the block chain unidirectionally receives the data of the master node of the block chain; the interaction of the blockchain master node, i.e., its interaction with each slave node.
Compared with the prior art, the application has the following beneficial effects:
the system relates to a network security application of a block chain and an information security application of full-flow monitoring. The full-flow monitoring concept is introduced, and the full-flow monitoring is realized through the distributed verification of the master-slave nodes of the intermediate code and the feedback code and the block chain. In the system, when abnormal operation occurs, the system can be timely adjusted to perform perfect leakage repairing measures such as system reset and the like through the feedback code and the intermediate code, and when logic flow of transmitted data is wrong, the system is combined with master and slave check nodes of the block chain to perform correction. Therefore, the phenomena of authority penetration, override, wall surrounding and the like can be perfectly made up, and a feedback monitoring mechanism of operation and data flow is established, so that the information safety under the information access operation is ensured to the maximum extent.
Drawings
FIG. 1 is a schematic block chain assisted dual verification monitoring module architecture;
FIG. 2 is a block chain feedback-intermediate decoding interpretation module architecture diagram;
FIG. 3 is a schematic block chain operation monitoring feedback module architecture;
FIG. 4 is a schematic diagram of a full-flow information security monitoring system based on blockchain auxiliary verification;
FIG. 5 is a schematic diagram of a block chain master slave verification interaction module.
Detailed Description
The present application is further illustrated in the accompanying drawings and detailed description which are to be understood as being merely illustrative of the application and not limiting of its scope, and various equivalent modifications to the application will fall within the scope of the application as defined in the appended claims after reading the application.
FIG. 4 shows a full-flow information security monitoring system based on the auxiliary checking of the block chain, which comprises four modules, namely a block chain auxiliary double checking monitoring module, a block chain feedback-intermediate decoding interpretation module, a block chain operation monitoring feedback module and a block chain master-slave checking interaction module.
The block chain auxiliary double-check monitoring module comprises: in order to have better adaptability, besides the consideration of signal time sequence and port compatibility, the design is used as an information security monitoring system, a check port is arranged between a network interface and an information monitoring port, a bidirectional information flow monitor is adopted to interact with a blockchain slave node, and meanwhile, the bidirectional information flow monitor and the check port of a user terminal are mutually checked, so that the security of an information flow is ensured, as shown in figure 1.
Information flow access path: the data access application enters from the network interface, and enters the information monitoring port after passing through the verification of the first verification port, which means that the data access record has generated a corresponding access log at the information monitoring port; after log record is generated without error, the log record is also required to be checked with a feedback code file (the generation of the feedback code file is illustrated in a block chain auxiliary double check monitoring module); and the information flow enters the user terminal after the verification is passed.
Blockchain assisted verification path: the block chain slave node I carries out interactive inspection on the check information and the check port I, and the check port I sends the check information to the bidirectional information flow exchange monitor and the check port II after the check is correct; meanwhile, after the information flow enters the user terminal, the user terminal sends check information to the second check port according to the information flow attribute, and the second check port carries out interactive verification on the check information and the first check port, so that the information flow between the two checks is prevented from being tampered or invaded, and even if illegal operation is found; and the verification is passed through the second verification port, and the verification information is sent to the two-way information flow exchange monitor for recording and matched verification with the second block chain slave node.
Block chain feedback-intermediate decoding interpretation module: in order to improve the processing efficiency and the running stability of the full-flow information security monitoring system, the design adopts a feedback code and intermediate code verification mode after entering the user terminal and after finishing the information operation, and the user operation and the information security are bound through the block chain master-slave nodes, as shown in fig. 2.
Information flow access path: the data access application enters the information security equipment from the user terminal, operation verification can be performed after the information access operation permission is passed, the information access is converted into an operation check code through the operation verification, the operation check code is sent to the block chain slave node IV, the block chain slave node IV converts the block chain information check code into an intermediate code file according to the block chain information check code, and the intermediate code file is interpreted as an executable command through a feedback-intermediate code interpreter to perform operation.
Blockchain assisted verification path: the information security device receives the verification information of the block chain slave node III, and verifies the verification result of the information security device; the feedback code file generated by the operation history record enters the feedback-intermediate code interpreter and the intermediate code to be interpreted cooperatively through the main node of the block chain (the generation of the feedback code file is described in the block chain auxiliary double check monitoring module), so that the intermediate code is ensured not to be tampered.
And the block chain operation monitoring feedback module: after the user operates, the system designs a blockchain execution feedback, so that the execution result of each information operation is analyzed and recorded, and a feedback code file is generated to carry out matching correction on future operations, as shown in fig. 3.
Information flow access path: after the intermediate code is generated and enters the feedback-intermediate code interpreter, the intermediate code is interpreted in combination with a feedback code file returned by the blockchain master node and interpreted as an executable command to operate (this part is consistent with the blockchain feedback-intermediate decoding interpretation module). And after the execution is finished, entering execution feedback, transmitting the execution feedback information to a third checking port by the execution feedback, and transmitting the feedback information to an operation block chain operation monitoring feedback module after checking to determine that the feedback information is correct, so as to generate a feedback code file.
Blockchain assisted verification path: and in the third checking port, the feedback information and the blockchain slave node five are checked.
The block chain master-slave verification interaction module: in order to improve fault tolerance and expansibility of the blockchain network and safety of the blockchain network, a blockchain master-slave check interaction module is designed, check codes of different nodes are cooperated through the blockchain master-slave nodes, and as shown in fig. 5, the data flow interaction path is as follows: the data of the first block chain slave node is unidirectionally transmitted to the second block chain slave node; the second block chain slave node unidirectionally receives data of the first block chain slave node, and performs bidirectional interaction with the main block chain node to perform collaborative verification of the data; the data of a block chain master node is received in a unidirectional way by a block chain slave node three; the block chain slave node IV performs bidirectional interaction with the block chain master node, and performs collaborative verification of data; the blockchain slave node five unidirectionally receives the data of the blockchain master node. The interaction of the blockchain master node is the interaction with each slave node.
The module has the following functions:
1. improving fault tolerance of the blockchain network: the block chain master-slave verification interaction module can realize continuous mutual verification between the master node and the slave nodes, so that when the master node fails, the work can be timely detected and switched to the backup slave node, and the fault tolerance and the reliability of the network are improved.
2. The expandability of the blockchain network is improved: by balancing the load between the master node and the slave nodes, the situation of congestion and overload of the network can be effectively prevented, and more nodes can be supported to be added, so that the expandability is improved.
3. Enhancing the security of the blockchain network: the block chain master-slave verification interaction module can ensure information synchronization and verification between the master node and the slave node, and can also support operations such as node networking again and dynamic joining and leaving, so that malicious attack and illegal access behaviors of the nodes are prevented, and the safety of the block chain network is ensured.
The system relates to a network security application of a block chain and an information security application of full-flow monitoring. The blockchain is a very hot technology for information protection at present, but the defect of a firewall is not optimized essentially, and on the basis, a full-flow monitoring concept is introduced, and full-flow monitoring is realized through intermediate code and feedback code and distribution verification of principal and subordinate nodes of the blockchain. In the system, when abnormal operation occurs, the system can be timely adjusted to perform perfect leakage repairing measures such as system reset and the like through the feedback code and the intermediate code, and when logic flow of transmitted data is wrong, the system is combined with master and slave check nodes of the block chain to perform correction. Therefore, the phenomena of authority penetration, override, wall surrounding and the like can be perfectly made up, and a feedback monitoring mechanism of operation and data flow is established, so that the information safety under the information access operation is ensured to the maximum extent.
The foregoing is only a preferred embodiment of the application, it being noted that: it will be apparent to those skilled in the art that various modifications and adaptations can be made without departing from the principles of the present application, and such modifications and adaptations are intended to be comprehended within the scope of the application.

Claims (3)

1. A full-flow information security monitoring system based on block chain auxiliary verification is characterized by comprising:
the block chain auxiliary double-check monitoring module comprises: a first check port is arranged between the network interface and the information monitoring port, a bidirectional information flow exchange monitor is adopted to interact with the block chain slave node, and a second check port arranged at the user terminal is mutually checked for ensuring the safety of the information flow;
block chain feedback-intermediate decoding interpretation module: after entering the user terminal and after finishing the information operation, adopting a feedback code and an intermediate code for verification, and binding the user operation and the information security through a block chain master-slave node, wherein the information flow access path comprises the following specific steps: the data access application enters the information security equipment from the user terminal, operation verification is carried out after information access operation permission is carried out, the information access is converted into an operation check code through the operation verification, the operation check code is sent to a block chain slave node IV, the block chain slave node IV converts the operation check code into an intermediate code file, and the intermediate code file is interpreted into an executable command to carry out operation after passing through a block chain feedback-intermediate code interpreter;
the auxiliary checking path of the block chain is as follows: the information security device receives the verification information of the block chain slave node III, and verifies the verification result of the information security device; the feedback code file generated by the operation history record enters a block chain feedback-intermediate code interpreter and an intermediate code file to be interpreted cooperatively through a block chain master node, so that the intermediate code is ensured not to be tampered;
and the block chain operation monitoring feedback module: designing a block chain to perform feedback, analyzing and recording the execution result of each information operation, and generating a feedback code file for performing matching correction on future operation;
the block chain master-slave verification interaction module realizes the synergy of the whole system through the block chain master-slave nodes by using the verification codes of different nodes, and the data interaction way is specifically as follows: the data of the first block chain slave node is unidirectionally transmitted to the second block chain slave node; the second block chain slave node unidirectionally receives data of the first block chain slave node, and performs bidirectional interaction with the main block chain node to perform collaborative verification of the data; the data of a block chain master node is received in a unidirectional way by a block chain slave node three; the block chain slave node IV performs bidirectional interaction with the block chain master node, and performs collaborative verification of data; the slave node five of the block chain unidirectionally receives the data of the master node of the block chain; the interaction of the blockchain master node, i.e., its interaction with each slave node.
2. The full-flow information security monitoring system based on the blockchain auxiliary check as in claim 1, wherein the information flow access path of the blockchain auxiliary double check monitoring module is specifically: the data access application enters from the network interface, and enters the information monitoring port after passing through the verification of the first verification port, which means that the data access record has generated a corresponding access log at the information monitoring port; after log record is generated without errors, the log record is checked with a feedback code file, and the checked information flow enters a user terminal;
the auxiliary checking path of the block chain is as follows: the block chain slave node I carries out interactive verification on the verification information and the verification port I, and the verification port I sends the verification information to the bidirectional information flow exchange monitor and the verification port II after the verification is correct; and meanwhile, after the information flow enters the user terminal, the user terminal sends the verification information to the second verification port according to the information flow attribute, the second verification port carries out interactive verification on the verification information and the first verification port, so that the information flow between the two verification is prevented from being tampered or invaded, illegal operation is found in time, and the verification information is sent to the bidirectional information flow exchange monitor for recording after passing through the second verification port for matching verification with the second block chain slave node.
3. The full-flow information security monitoring system based on blockchain auxiliary verification according to claim 1, wherein the information flow access path of the blockchain operation monitoring feedback module is specifically: after the generated intermediate code file enters a block chain feedback-intermediate code interpreter, the intermediate code file is interpreted by combining the feedback code file returned by the block chain main node and is interpreted as an executable command to operate; after execution is completed, executing feedback is carried out, executing feedback sends executing feedback information to a third checking port, after checking to confirm that the feedback information is correct, the executing feedback sends the feedback information to a block chain operation monitoring feedback module, and a feedback code file is generated;
the auxiliary checking path of the block chain is as follows: in the third check port, the feedback information is checked with the blockchain slave node five.
CN202310681552.2A 2023-06-09 2023-06-09 Full-flow information security monitoring system based on block chain auxiliary verification Active CN116418601B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310681552.2A CN116418601B (en) 2023-06-09 2023-06-09 Full-flow information security monitoring system based on block chain auxiliary verification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310681552.2A CN116418601B (en) 2023-06-09 2023-06-09 Full-flow information security monitoring system based on block chain auxiliary verification

Publications (2)

Publication Number Publication Date
CN116418601A CN116418601A (en) 2023-07-11
CN116418601B true CN116418601B (en) 2023-08-22

Family

ID=87049591

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310681552.2A Active CN116418601B (en) 2023-06-09 2023-06-09 Full-flow information security monitoring system based on block chain auxiliary verification

Country Status (1)

Country Link
CN (1) CN116418601B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103793644A (en) * 2014-02-28 2014-05-14 天地融科技股份有限公司 Method for information safety device to achieve multiple applications, and information safety device and system
CN106778343A (en) * 2016-12-12 2017-05-31 武汉优聘科技有限公司 It is a kind of that the data sharing method of private data is related to based on block chain
CN111447238A (en) * 2020-04-13 2020-07-24 夏彬彬 Data sharing system based on block chain
CN113781048A (en) * 2021-11-15 2021-12-10 环球数科集团有限公司 Transaction information verification and settlement method based on block chain
CN114254269A (en) * 2021-12-24 2022-03-29 北京航空航天大学云南创新研究院 System and method for determining rights of biological digital assets based on block chain technology
CN114760075A (en) * 2022-06-14 2022-07-15 南京信息工程大学 Multi-network information emergency safety system based on block chain and watchdog WDGM
CN115935414A (en) * 2022-12-05 2023-04-07 中国南方电网有限责任公司超高压输电公司昆明局 Block chain based data verification method and device, electronic equipment and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103793644A (en) * 2014-02-28 2014-05-14 天地融科技股份有限公司 Method for information safety device to achieve multiple applications, and information safety device and system
CN106778343A (en) * 2016-12-12 2017-05-31 武汉优聘科技有限公司 It is a kind of that the data sharing method of private data is related to based on block chain
CN111447238A (en) * 2020-04-13 2020-07-24 夏彬彬 Data sharing system based on block chain
CN113781048A (en) * 2021-11-15 2021-12-10 环球数科集团有限公司 Transaction information verification and settlement method based on block chain
CN114254269A (en) * 2021-12-24 2022-03-29 北京航空航天大学云南创新研究院 System and method for determining rights of biological digital assets based on block chain technology
CN114760075A (en) * 2022-06-14 2022-07-15 南京信息工程大学 Multi-network information emergency safety system based on block chain and watchdog WDGM
CN115935414A (en) * 2022-12-05 2023-04-07 中国南方电网有限责任公司超高压输电公司昆明局 Block chain based data verification method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN116418601A (en) 2023-07-11

Similar Documents

Publication Publication Date Title
US10609029B2 (en) High assurance segregated gateway interconnecting different domains
US10462103B2 (en) High assurance security gateway interconnecting different domains
CN102647406B (en) Intelligent integrated network security device for high-availability applications
US9043589B2 (en) System and method for safeguarding and processing confidential information
CN103139058A (en) Internet of things security access gateway
CN105812387A (en) Unidirectional safe data exchange device
CN107968775B (en) Data processing method and device, computer equipment and computer readable storage medium
TW201509151A (en) A method and computer program product for providing a remote diagnosis with a secure connection for an appliance and an appliance performing the method
JPH09261220A (en) Virtual authentification network for maintenance processor
CN109617929B (en) Node and user interactive authentication method and system in block chain network mode
CN102045309A (en) Method and device for preventing computer from being attacked by virus
CN116418601B (en) Full-flow information security monitoring system based on block chain auxiliary verification
CN114710360B (en) Audit-based inside-to-outside data security transmission method and system and electronic equipment
CN112953897B (en) Train control system edge security node implementation method based on cloud computing equipment
Djemaiel et al. Intrusion detection and tolerance: A global scheme
Bejani et al. A new architecture for intrusion-tolerant web services based on design diversity techniques
Sheff et al. Distributed protocols and heterogeneous trust: Technical report
Valdivia et al. Coexistence of safety and security: Synchronized redundant system with security enhancements
Yun et al. Security validation for data diode with reverse channel
Shin et al. Threat modeling for security failure-tolerant requirements
Djambazova et al. Emerging and future cyber threats to critical systems
Hofmann et al. Towards a security architecture for IP-based optical transmission systems
CN115913673A (en) Block chain network security evaluation system
Tworek Cyber security requirements for railway control systems according to standard IEC 62443
TN et al. Survey to Understand Data and Information Security Issues and Other Challenges for IoT

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant