CN116418601B - Full-flow information security monitoring system based on block chain auxiliary verification - Google Patents
Full-flow information security monitoring system based on block chain auxiliary verification Download PDFInfo
- Publication number
- CN116418601B CN116418601B CN202310681552.2A CN202310681552A CN116418601B CN 116418601 B CN116418601 B CN 116418601B CN 202310681552 A CN202310681552 A CN 202310681552A CN 116418601 B CN116418601 B CN 116418601B
- Authority
- CN
- China
- Prior art keywords
- block chain
- verification
- information
- feedback
- port
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012795 verification Methods 0.000 title claims abstract description 80
- 238000012544 monitoring process Methods 0.000 title claims abstract description 57
- 230000003993 interaction Effects 0.000 claims abstract description 25
- 238000012937 correction Methods 0.000 claims abstract description 6
- 230000002457 bidirectional effect Effects 0.000 claims description 14
- 230000002452 interceptive effect Effects 0.000 claims description 6
- 238000013524 data verification Methods 0.000 claims description 3
- 230000002159 abnormal effect Effects 0.000 abstract description 3
- 230000007246 mechanism Effects 0.000 abstract description 3
- 230000035515 penetration Effects 0.000 abstract description 3
- 238000004891 communication Methods 0.000 description 6
- 238000013461 design Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000006978 adaptation Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The application discloses a full-flow information security monitoring system based on block chain auxiliary verification, which comprises: the system comprises a block chain auxiliary double-check monitoring module, a block chain feedback-intermediate decoding interpretation module, a block chain operation monitoring feedback module and a block chain master-slave check interaction module; by introducing a full-flow monitoring concept and through intermediate code and feedback code and block chain master-slave node distribution verification, full-flow monitoring is realized. In the system, when abnormal operation occurs, the system can be timely adjusted to perform perfect leakage repairing measures such as system reset and the like through the feedback code and the intermediate code, and when logic flow of transmitted data is wrong, the system is combined with master and slave check nodes of the block chain to perform correction. Therefore, the phenomena of authority penetration, override, wall surrounding and the like can be perfectly made up, and a feedback monitoring mechanism of operation and data flow is established, so that the information safety under the information access operation is ensured to the maximum extent.
Description
Technical Field
The application relates to network security application of a blockchain, in particular to a full-flow information security monitoring system based on blockchain auxiliary verification.
Background
Network security, generally refers to the security of a computer network, and in fact may also refer to the security of a computer communication network. The computer communication network is a system for interconnecting a plurality of computers with independent functions through communication equipment and transmission media and realizing information transmission and exchange among the computers under the support of communication software. The computer network is a system in which a plurality of independent computer systems, terminal devices and data devices distributed in a region are connected by communication means for the purpose of sharing resources, and data exchange is performed under the control of a protocol. The fundamental purpose of computer networks is resource sharing, and communication networks are ways to realize network resource sharing, so that computer networks are secure, and corresponding computer communication networks must be secure, so that information exchange and resource sharing should be realized for network users.
However, the current network security still has a great vulnerability, especially in the case of information access, the network information security is always vulnerable to attack and intrusion. The current network security system is mainly composed of a firewall and related software and hardware, which establishes a security gateway between the Internet and the intranet, thereby protecting the intranet from illegal users. However, the phenomena of rights permeation, rights override, wall surrounding, data tampering and the like are all the problems that are difficult to solve by the firewall.
Disclosure of Invention
The application aims to: in order to overcome the defects in the prior art, the application provides a full-flow information security monitoring system based on block chain auxiliary verification, which realizes full-flow monitoring through intermediate code and feedback code and block chain master-slave node distribution verification.
The technical scheme is as follows: in order to achieve the above purpose, the application adopts the following technical scheme:
a full-flow information security monitoring system based on blockchain auxiliary verification, comprising:
the block chain auxiliary double-check monitoring module comprises: a first check port is arranged between the network interface and the information monitoring port, a bidirectional information flow monitor is adopted to interact with the block chain slave node, and a second check port arranged at the user terminal is mutually checked for ensuring the safety of the information flow;
block chain feedback-intermediate decoding interpretation module: after entering the user terminal and after finishing the information operation, adopting a feedback code and an intermediate code for verification, binding the user operation and the information security through the master-slave nodes of the block chain,
and the block chain operation monitoring feedback module: designing a block chain to perform feedback, analyzing and recording the execution result of each information operation, and generating a feedback code file for performing matching correction on future operation;
and the block chain master-slave verification interaction module realizes the cooperation of the whole system through the block chain master-slave nodes by using the verification codes of different nodes.
As a preferred embodiment of the present application: the information flow access path of the block chain auxiliary double-check monitoring module is specifically as follows: the data access application enters from the network interface, and enters the information monitoring port after passing through the verification of the first verification port, which means that the data access record has generated a corresponding access log at the information monitoring port; after log record is generated without errors, checking the log record with a feedback code file, and explaining the generation of the feedback code file in a block chain auxiliary double check monitoring module; after passing the check, the information flow enters the user terminal;
the auxiliary checking path of the block chain is as follows: the block chain slave node I carries out interactive inspection on the check information and the check port I, and the check port I sends the check information to the bidirectional information flow exchange monitor and the check port II after the check is correct; meanwhile, after the information flow enters the user terminal, the user terminal sends check information to the second check port according to the information flow attribute, and the second check port carries out interactive verification on the check information and the first check port, so that the information flow between the two checks is prevented from being tampered or invaded, and even if illegal operation is found; and the verification is passed through the second verification port, and the verification information is sent to the two-way information flow exchange monitor for recording and matched verification with the second block chain slave node.
As a preferred embodiment of the present application: the information flow access path in the block chain feedback-intermediate decoding interpretation module is specifically: the data access application enters the information security equipment from the user terminal, operation verification is carried out after information access operation permission is carried out, the information access is converted into an operation check code through the operation verification, the operation check code is sent to a block chain slave node IV, the block chain slave node IV converts the block chain information check code into an intermediate code file according to the block chain information check code and carries out operation through a feedback-intermediate code interpreter, and the intermediate code file is used for interpreting the intermediate code file into an executable command;
the auxiliary checking path of the block chain is as follows: the information security device receives the verification information of the block chain slave node III, and verifies the verification result of the information security device; and a feedback code file generated by the operation history record enters a feedback-intermediate code interpreter and intermediate code cooperation for interpretation through a block chain main node, and the generation of the feedback code file is illustrated in a block chain auxiliary double-check monitoring module, so that the intermediate code is ensured not to be tampered.
As a preferred embodiment of the present application: the information flow access path of the block chain operation monitoring feedback module is specifically as follows: after the generated intermediate code enters a feedback-intermediate code interpreter, the intermediate code is interpreted by combining a feedback code file returned by a block chain main node and is interpreted as an executable command to operate; after execution is completed, executing feedback is carried out, executing feedback sends executing feedback information to a third checking port, after checking to confirm that the feedback information is correct, the executing feedback sends the feedback information to an operation block chain operation monitoring feedback module, and a feedback code file is generated;
the auxiliary checking path of the block chain is as follows: in the third check port, the feedback information is checked with the blockchain slave node five.
As a preferred embodiment of the present application: the data interaction way in the block chain master-slave verification interaction module is specifically as follows: the data of the first block chain slave node is unidirectionally transmitted to the second block chain slave node; the second block chain slave node unidirectionally receives data of the first block chain slave node, and performs bidirectional interaction with the main block chain node to perform collaborative verification of the data; the data of a block chain master node is received in a unidirectional way by a block chain slave node three; the block chain slave node IV performs bidirectional interaction with the block chain master node, and performs collaborative verification of data; the slave node five of the block chain unidirectionally receives the data of the master node of the block chain; the interaction of the blockchain master node, i.e., its interaction with each slave node.
Compared with the prior art, the application has the following beneficial effects:
the system relates to a network security application of a block chain and an information security application of full-flow monitoring. The full-flow monitoring concept is introduced, and the full-flow monitoring is realized through the distributed verification of the master-slave nodes of the intermediate code and the feedback code and the block chain. In the system, when abnormal operation occurs, the system can be timely adjusted to perform perfect leakage repairing measures such as system reset and the like through the feedback code and the intermediate code, and when logic flow of transmitted data is wrong, the system is combined with master and slave check nodes of the block chain to perform correction. Therefore, the phenomena of authority penetration, override, wall surrounding and the like can be perfectly made up, and a feedback monitoring mechanism of operation and data flow is established, so that the information safety under the information access operation is ensured to the maximum extent.
Drawings
FIG. 1 is a schematic block chain assisted dual verification monitoring module architecture;
FIG. 2 is a block chain feedback-intermediate decoding interpretation module architecture diagram;
FIG. 3 is a schematic block chain operation monitoring feedback module architecture;
FIG. 4 is a schematic diagram of a full-flow information security monitoring system based on blockchain auxiliary verification;
FIG. 5 is a schematic diagram of a block chain master slave verification interaction module.
Detailed Description
The present application is further illustrated in the accompanying drawings and detailed description which are to be understood as being merely illustrative of the application and not limiting of its scope, and various equivalent modifications to the application will fall within the scope of the application as defined in the appended claims after reading the application.
FIG. 4 shows a full-flow information security monitoring system based on the auxiliary checking of the block chain, which comprises four modules, namely a block chain auxiliary double checking monitoring module, a block chain feedback-intermediate decoding interpretation module, a block chain operation monitoring feedback module and a block chain master-slave checking interaction module.
The block chain auxiliary double-check monitoring module comprises: in order to have better adaptability, besides the consideration of signal time sequence and port compatibility, the design is used as an information security monitoring system, a check port is arranged between a network interface and an information monitoring port, a bidirectional information flow monitor is adopted to interact with a blockchain slave node, and meanwhile, the bidirectional information flow monitor and the check port of a user terminal are mutually checked, so that the security of an information flow is ensured, as shown in figure 1.
Information flow access path: the data access application enters from the network interface, and enters the information monitoring port after passing through the verification of the first verification port, which means that the data access record has generated a corresponding access log at the information monitoring port; after log record is generated without error, the log record is also required to be checked with a feedback code file (the generation of the feedback code file is illustrated in a block chain auxiliary double check monitoring module); and the information flow enters the user terminal after the verification is passed.
Blockchain assisted verification path: the block chain slave node I carries out interactive inspection on the check information and the check port I, and the check port I sends the check information to the bidirectional information flow exchange monitor and the check port II after the check is correct; meanwhile, after the information flow enters the user terminal, the user terminal sends check information to the second check port according to the information flow attribute, and the second check port carries out interactive verification on the check information and the first check port, so that the information flow between the two checks is prevented from being tampered or invaded, and even if illegal operation is found; and the verification is passed through the second verification port, and the verification information is sent to the two-way information flow exchange monitor for recording and matched verification with the second block chain slave node.
Block chain feedback-intermediate decoding interpretation module: in order to improve the processing efficiency and the running stability of the full-flow information security monitoring system, the design adopts a feedback code and intermediate code verification mode after entering the user terminal and after finishing the information operation, and the user operation and the information security are bound through the block chain master-slave nodes, as shown in fig. 2.
Information flow access path: the data access application enters the information security equipment from the user terminal, operation verification can be performed after the information access operation permission is passed, the information access is converted into an operation check code through the operation verification, the operation check code is sent to the block chain slave node IV, the block chain slave node IV converts the block chain information check code into an intermediate code file according to the block chain information check code, and the intermediate code file is interpreted as an executable command through a feedback-intermediate code interpreter to perform operation.
Blockchain assisted verification path: the information security device receives the verification information of the block chain slave node III, and verifies the verification result of the information security device; the feedback code file generated by the operation history record enters the feedback-intermediate code interpreter and the intermediate code to be interpreted cooperatively through the main node of the block chain (the generation of the feedback code file is described in the block chain auxiliary double check monitoring module), so that the intermediate code is ensured not to be tampered.
And the block chain operation monitoring feedback module: after the user operates, the system designs a blockchain execution feedback, so that the execution result of each information operation is analyzed and recorded, and a feedback code file is generated to carry out matching correction on future operations, as shown in fig. 3.
Information flow access path: after the intermediate code is generated and enters the feedback-intermediate code interpreter, the intermediate code is interpreted in combination with a feedback code file returned by the blockchain master node and interpreted as an executable command to operate (this part is consistent with the blockchain feedback-intermediate decoding interpretation module). And after the execution is finished, entering execution feedback, transmitting the execution feedback information to a third checking port by the execution feedback, and transmitting the feedback information to an operation block chain operation monitoring feedback module after checking to determine that the feedback information is correct, so as to generate a feedback code file.
Blockchain assisted verification path: and in the third checking port, the feedback information and the blockchain slave node five are checked.
The block chain master-slave verification interaction module: in order to improve fault tolerance and expansibility of the blockchain network and safety of the blockchain network, a blockchain master-slave check interaction module is designed, check codes of different nodes are cooperated through the blockchain master-slave nodes, and as shown in fig. 5, the data flow interaction path is as follows: the data of the first block chain slave node is unidirectionally transmitted to the second block chain slave node; the second block chain slave node unidirectionally receives data of the first block chain slave node, and performs bidirectional interaction with the main block chain node to perform collaborative verification of the data; the data of a block chain master node is received in a unidirectional way by a block chain slave node three; the block chain slave node IV performs bidirectional interaction with the block chain master node, and performs collaborative verification of data; the blockchain slave node five unidirectionally receives the data of the blockchain master node. The interaction of the blockchain master node is the interaction with each slave node.
The module has the following functions:
1. improving fault tolerance of the blockchain network: the block chain master-slave verification interaction module can realize continuous mutual verification between the master node and the slave nodes, so that when the master node fails, the work can be timely detected and switched to the backup slave node, and the fault tolerance and the reliability of the network are improved.
2. The expandability of the blockchain network is improved: by balancing the load between the master node and the slave nodes, the situation of congestion and overload of the network can be effectively prevented, and more nodes can be supported to be added, so that the expandability is improved.
3. Enhancing the security of the blockchain network: the block chain master-slave verification interaction module can ensure information synchronization and verification between the master node and the slave node, and can also support operations such as node networking again and dynamic joining and leaving, so that malicious attack and illegal access behaviors of the nodes are prevented, and the safety of the block chain network is ensured.
The system relates to a network security application of a block chain and an information security application of full-flow monitoring. The blockchain is a very hot technology for information protection at present, but the defect of a firewall is not optimized essentially, and on the basis, a full-flow monitoring concept is introduced, and full-flow monitoring is realized through intermediate code and feedback code and distribution verification of principal and subordinate nodes of the blockchain. In the system, when abnormal operation occurs, the system can be timely adjusted to perform perfect leakage repairing measures such as system reset and the like through the feedback code and the intermediate code, and when logic flow of transmitted data is wrong, the system is combined with master and slave check nodes of the block chain to perform correction. Therefore, the phenomena of authority penetration, override, wall surrounding and the like can be perfectly made up, and a feedback monitoring mechanism of operation and data flow is established, so that the information safety under the information access operation is ensured to the maximum extent.
The foregoing is only a preferred embodiment of the application, it being noted that: it will be apparent to those skilled in the art that various modifications and adaptations can be made without departing from the principles of the present application, and such modifications and adaptations are intended to be comprehended within the scope of the application.
Claims (3)
1. A full-flow information security monitoring system based on block chain auxiliary verification is characterized by comprising:
the block chain auxiliary double-check monitoring module comprises: a first check port is arranged between the network interface and the information monitoring port, a bidirectional information flow exchange monitor is adopted to interact with the block chain slave node, and a second check port arranged at the user terminal is mutually checked for ensuring the safety of the information flow;
block chain feedback-intermediate decoding interpretation module: after entering the user terminal and after finishing the information operation, adopting a feedback code and an intermediate code for verification, and binding the user operation and the information security through a block chain master-slave node, wherein the information flow access path comprises the following specific steps: the data access application enters the information security equipment from the user terminal, operation verification is carried out after information access operation permission is carried out, the information access is converted into an operation check code through the operation verification, the operation check code is sent to a block chain slave node IV, the block chain slave node IV converts the operation check code into an intermediate code file, and the intermediate code file is interpreted into an executable command to carry out operation after passing through a block chain feedback-intermediate code interpreter;
the auxiliary checking path of the block chain is as follows: the information security device receives the verification information of the block chain slave node III, and verifies the verification result of the information security device; the feedback code file generated by the operation history record enters a block chain feedback-intermediate code interpreter and an intermediate code file to be interpreted cooperatively through a block chain master node, so that the intermediate code is ensured not to be tampered;
and the block chain operation monitoring feedback module: designing a block chain to perform feedback, analyzing and recording the execution result of each information operation, and generating a feedback code file for performing matching correction on future operation;
the block chain master-slave verification interaction module realizes the synergy of the whole system through the block chain master-slave nodes by using the verification codes of different nodes, and the data interaction way is specifically as follows: the data of the first block chain slave node is unidirectionally transmitted to the second block chain slave node; the second block chain slave node unidirectionally receives data of the first block chain slave node, and performs bidirectional interaction with the main block chain node to perform collaborative verification of the data; the data of a block chain master node is received in a unidirectional way by a block chain slave node three; the block chain slave node IV performs bidirectional interaction with the block chain master node, and performs collaborative verification of data; the slave node five of the block chain unidirectionally receives the data of the master node of the block chain; the interaction of the blockchain master node, i.e., its interaction with each slave node.
2. The full-flow information security monitoring system based on the blockchain auxiliary check as in claim 1, wherein the information flow access path of the blockchain auxiliary double check monitoring module is specifically: the data access application enters from the network interface, and enters the information monitoring port after passing through the verification of the first verification port, which means that the data access record has generated a corresponding access log at the information monitoring port; after log record is generated without errors, the log record is checked with a feedback code file, and the checked information flow enters a user terminal;
the auxiliary checking path of the block chain is as follows: the block chain slave node I carries out interactive verification on the verification information and the verification port I, and the verification port I sends the verification information to the bidirectional information flow exchange monitor and the verification port II after the verification is correct; and meanwhile, after the information flow enters the user terminal, the user terminal sends the verification information to the second verification port according to the information flow attribute, the second verification port carries out interactive verification on the verification information and the first verification port, so that the information flow between the two verification is prevented from being tampered or invaded, illegal operation is found in time, and the verification information is sent to the bidirectional information flow exchange monitor for recording after passing through the second verification port for matching verification with the second block chain slave node.
3. The full-flow information security monitoring system based on blockchain auxiliary verification according to claim 1, wherein the information flow access path of the blockchain operation monitoring feedback module is specifically: after the generated intermediate code file enters a block chain feedback-intermediate code interpreter, the intermediate code file is interpreted by combining the feedback code file returned by the block chain main node and is interpreted as an executable command to operate; after execution is completed, executing feedback is carried out, executing feedback sends executing feedback information to a third checking port, after checking to confirm that the feedback information is correct, the executing feedback sends the feedback information to a block chain operation monitoring feedback module, and a feedback code file is generated;
the auxiliary checking path of the block chain is as follows: in the third check port, the feedback information is checked with the blockchain slave node five.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310681552.2A CN116418601B (en) | 2023-06-09 | 2023-06-09 | Full-flow information security monitoring system based on block chain auxiliary verification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310681552.2A CN116418601B (en) | 2023-06-09 | 2023-06-09 | Full-flow information security monitoring system based on block chain auxiliary verification |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116418601A CN116418601A (en) | 2023-07-11 |
CN116418601B true CN116418601B (en) | 2023-08-22 |
Family
ID=87049591
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310681552.2A Active CN116418601B (en) | 2023-06-09 | 2023-06-09 | Full-flow information security monitoring system based on block chain auxiliary verification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116418601B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103793644A (en) * | 2014-02-28 | 2014-05-14 | 天地融科技股份有限公司 | Method for information safety device to achieve multiple applications, and information safety device and system |
CN106778343A (en) * | 2016-12-12 | 2017-05-31 | 武汉优聘科技有限公司 | It is a kind of that the data sharing method of private data is related to based on block chain |
CN111447238A (en) * | 2020-04-13 | 2020-07-24 | 夏彬彬 | Data sharing system based on block chain |
CN113781048A (en) * | 2021-11-15 | 2021-12-10 | 环球数科集团有限公司 | Transaction information verification and settlement method based on block chain |
CN114254269A (en) * | 2021-12-24 | 2022-03-29 | 北京航空航天大学云南创新研究院 | System and method for determining rights of biological digital assets based on block chain technology |
CN114760075A (en) * | 2022-06-14 | 2022-07-15 | 南京信息工程大学 | Multi-network information emergency safety system based on block chain and watchdog WDGM |
CN115935414A (en) * | 2022-12-05 | 2023-04-07 | 中国南方电网有限责任公司超高压输电公司昆明局 | Block chain based data verification method and device, electronic equipment and storage medium |
-
2023
- 2023-06-09 CN CN202310681552.2A patent/CN116418601B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103793644A (en) * | 2014-02-28 | 2014-05-14 | 天地融科技股份有限公司 | Method for information safety device to achieve multiple applications, and information safety device and system |
CN106778343A (en) * | 2016-12-12 | 2017-05-31 | 武汉优聘科技有限公司 | It is a kind of that the data sharing method of private data is related to based on block chain |
CN111447238A (en) * | 2020-04-13 | 2020-07-24 | 夏彬彬 | Data sharing system based on block chain |
CN113781048A (en) * | 2021-11-15 | 2021-12-10 | 环球数科集团有限公司 | Transaction information verification and settlement method based on block chain |
CN114254269A (en) * | 2021-12-24 | 2022-03-29 | 北京航空航天大学云南创新研究院 | System and method for determining rights of biological digital assets based on block chain technology |
CN114760075A (en) * | 2022-06-14 | 2022-07-15 | 南京信息工程大学 | Multi-network information emergency safety system based on block chain and watchdog WDGM |
CN115935414A (en) * | 2022-12-05 | 2023-04-07 | 中国南方电网有限责任公司超高压输电公司昆明局 | Block chain based data verification method and device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN116418601A (en) | 2023-07-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10609029B2 (en) | High assurance segregated gateway interconnecting different domains | |
US10462103B2 (en) | High assurance security gateway interconnecting different domains | |
CN102647406B (en) | Intelligent integrated network security device for high-availability applications | |
US9043589B2 (en) | System and method for safeguarding and processing confidential information | |
CN103139058A (en) | Internet of things security access gateway | |
CN105812387A (en) | Unidirectional safe data exchange device | |
CN107968775B (en) | Data processing method and device, computer equipment and computer readable storage medium | |
TW201509151A (en) | A method and computer program product for providing a remote diagnosis with a secure connection for an appliance and an appliance performing the method | |
JPH09261220A (en) | Virtual authentification network for maintenance processor | |
CN109617929B (en) | Node and user interactive authentication method and system in block chain network mode | |
CN102045309A (en) | Method and device for preventing computer from being attacked by virus | |
CN116418601B (en) | Full-flow information security monitoring system based on block chain auxiliary verification | |
CN114710360B (en) | Audit-based inside-to-outside data security transmission method and system and electronic equipment | |
CN112953897B (en) | Train control system edge security node implementation method based on cloud computing equipment | |
Djemaiel et al. | Intrusion detection and tolerance: A global scheme | |
Bejani et al. | A new architecture for intrusion-tolerant web services based on design diversity techniques | |
Sheff et al. | Distributed protocols and heterogeneous trust: Technical report | |
Valdivia et al. | Coexistence of safety and security: Synchronized redundant system with security enhancements | |
Yun et al. | Security validation for data diode with reverse channel | |
Shin et al. | Threat modeling for security failure-tolerant requirements | |
Djambazova et al. | Emerging and future cyber threats to critical systems | |
Hofmann et al. | Towards a security architecture for IP-based optical transmission systems | |
CN115913673A (en) | Block chain network security evaluation system | |
Tworek | Cyber security requirements for railway control systems according to standard IEC 62443 | |
TN et al. | Survey to Understand Data and Information Security Issues and Other Challenges for IoT |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |