Tamper-resistant storage system and control method for network device resource detection information

A technology of network equipment and resource information, which is applied in the field of information security, can solve problems such as lack of large-scale data processing capabilities and the inability to provide sufficient computing power with blockchain technology, so as to improve service response speed, reduce transmission delay, The effect of reducing the amount of calculation

Active Publication Date: 2021-05-25
SHANGHAI JIAOTONG UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is that in the existing mobile network, the communication base station does not have large-scale data processing capabilities other than the basic signal data processing capabilities, and cannot provide sufficient computing power for blockchain technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Tamper-resistant storage system and control method for network device resource detection information
  • Tamper-resistant storage system and control method for network device resource detection information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0028] In a specific implementation manner, a method for controlling a tamper-proof storage system for network device resource detection information includes a central virtual machine and several sub-virtual machines, and the specific implementation steps are as follows:

[0029] (1), analysis and investigation of the data packet described in the central virtual machine obtains a new network device resource information, and uses a symmetric key to encrypt the key fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a tamper-proof storage system and a control method for network device resource exploration information, which relate to the field of information security and include a base station and several smart devices connected to the base station. The base station and each of the smart devices are equipped with Fog computing program, the base station is set as a fog computing center virtual machine, the smart device is set as a fog computing sub-virtual machine, each of the sub-virtual machines is managed by the central virtual machine, the central virtual machine and the sub-virtual machine The virtual machine is equipped with a data packet analysis program, which has the advantage of reducing the calculation amount of the base station, improving the large-scale data processing capability, and providing sufficient computing power for the blockchain technology.

Description

technical field [0001] The invention relates to the field of information security, in particular to a tamper-proof storage system and a control method for network equipment resource exploration information. Background technique [0002] For the network device resource detection in the existing mobile network, two technical routes are mainly adopted. The first one uses the traceroute function realized by the ICMP protocol TTL field in the IP network, so as to detect the resources of the nodes in the network. detection; the other requires the deployment of packet analysis (packet analysis) capabilities in the data relay node, so as to capture the data packets passing through the node, and then decode and further analyze them, so as to obtain the information of the nodes sending data in the network. resource information. However, the above two methods will face a defect in the mobile network scenario, that is, in the existing mobile network scenario, a large number of mobile n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04L29/06H04L9/06
CPCH04L9/0643H04L63/123H04W12/02
Inventor 林祥叶天鹏齐开悦谢方军李建华
Owner SHANGHAI JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products