Tamper-proofing storage system of network device resource exploration information and control method thereof

A technology of network equipment and resource information, applied in the field of information security, it can solve the problems of lack of large-scale data processing capabilities and the inability of blockchain technology to provide sufficient computing power, and achieve the effect of reducing tampering

Active Publication Date: 2019-01-11
SHANGHAI JIAO TONG UNIV
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is that in the existing mobile network, the communication base station does not have large-sca

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Tamper-proofing storage system of network device resource exploration information and control method thereof
  • Tamper-proofing storage system of network device resource exploration information and control method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0028] In a specific implementation manner, a method for controlling a tamper-proof storage system for network device resource detection information includes a central virtual machine and several sub-virtual machines, and the specific implementation steps are as follows:

[0029] (1), analysis and investigation of the data packet described in the central virtual machine obtains a new network device resource information, and uses a symmetric key to encrypt the key fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a tamper-proofing storage system of network device resource exploration information and a control method thereof, and relates to the field of information safety. The system comprises a base station and a plurality of intelligent devices connected with the base station, the base station and the intelligent devices are all provided with fog computing programs, the basestation is provided with a fog computing center virtual machine, the intelligent devices are provided with a plurality of fog computing sub virtual machines, the sub virtual machines are managed by the center virtual machine, and the center virtual machine and the sub virtual machines are all provided with data packet analysis programs. The tamper-proofing storage system of network device resource exploration information and the control method thereof reduce the computing amount of the base station, improve the large-scale data processing capacity and provide enough computing power for the blockchain technology.

Description

technical field [0001] The invention relates to the field of information security, in particular to a tamper-proof storage system and a control method for network equipment resource exploration information. Background technique [0002] For the network device resource detection in the existing mobile network, two technical routes are mainly adopted. The first one uses the traceroute function realized by the ICMP protocol TTL field in the IP network, so as to detect the resources of the nodes in the network. detection; the other requires the deployment of packet analysis (packet analysis) capabilities in the data relay node, so as to capture the data packets passing through the node, and then decode and further analyze them, so as to obtain the information of the nodes sending data in the network. resource information. However, the above two methods will face a defect in the mobile network scenario, that is, in the existing mobile network scenario, a large number of mobile n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04L29/06H04L9/06
CPCH04L9/0643H04L63/123H04W12/02
Inventor 林祥叶天鹏齐开悦谢方军李建华
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products