Blockchain-based network security auditing system and network security auditing method

A technology of network security and blockchain, applied in the field of network security audit, network security audit system based on blockchain, can solve problems such as inability to ensure consistency

Active Publication Date: 2018-11-16
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF7 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem solved by the present invention is that in the prior art, the system administrator can add and delete audit data, and there is a defect that the obtained audit d

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be described in further detail below in conjunction with the examples, but the protection scope of the present invention is not limited thereto.

[0025] The invention relates to a block chain-based network security audit method, which adds block chain components to a traditional audit system to ensure that audit data cannot be tampered with.

[0026] The method includes the following steps.

[0027] Step 1: Data initialization, any audit server applies to the key management server for a signature public-private key pair (pka, ska) and key pkb , the blockchain block generation server applies for the signature public key from the key management server pka .

[0028] In the step 1, the signature public-private key pair of any audit server (pka, ska) and key pkb only one.

[0029] In the step 1, the display terminal applies to the key management server for the decryption private key skb .

[0030] In the present invention, the publ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a blockchain-based network security auditing system and a blockchain-based network security auditing method. The network security auditing method comprises the steps that: anauditing server applies for a signature public/private key pair and a secret key to a secret key management server, a block generation server of the blockchain applies for a signature public key to the secret key management server, the auditing server acquires data to be audited and encrypts the data to be audited to generate C1, re-encrypts an encryption secret key to generate a C2, and performing digital signature on the C1 and the C2 by means of the private key to generate sigma; and the auditing server transmits the C1, the C2 and the sigma to the block generation server, the data to be audited is placed in a data buffer region after the C1, the C2 and the sigma are verified to be valid by using the public key, generates a new block and broadcasts the new block when a block generationcondition is met, and a display terminal can request the block generation server to view the audit data. The blockchain-based network security auditing system and the blockchain-based network securityauditing method utilize the blockchain technology, and adds the blockchain into the auditing system, thus the audit data cannot be tampered, the data security is improved, the audit data in the blockchain is encrypted to ensure that the audit data can only be accessed by authorized users, and the confidentiality of the audit data is protected.

Description

technical field [0001] The present invention relates to the technical field of secure communication, in particular to a block chain-based network security audit system and a network security audit method in which a block chain component is added to a traditional audit system to ensure that audit data cannot be tampered with. Background technique [0002] Computer network security audit is a process of checking, reviewing and testing the environment and activities of operating events by using information such as records, system activities and user activities according to a certain security strategy, so as to discover system loopholes, intrusion behaviors or improve system performance. The process of assessing system security risks and taking appropriate actions. The network security audit conducts independent review and evaluation of system records and behaviors, deters and warns possible potential attackers, tests the control of the system and adjusts it in time to ensure th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L63/045H04L63/062H04L63/12
Inventor 邵俊范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products