Safety protection method and device for sea battle data based on blockchain

A security protection device and technology of security protection, applied in the direction of security communication device, digital transmission system, user identity/authority verification, etc. The effect of safety, reducing dependence, and taking into account the efficiency

Active Publication Date: 2019-01-18
BEIHANG UNIV
View PDF5 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the traditional central data system, the data is processed and verified by the central node. Once the central node fails or is intercepted and damaged by

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety protection method and device for sea battle data based on blockchain
  • Safety protection method and device for sea battle data based on blockchain
  • Safety protection method and device for sea battle data based on blockchain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0063] The following describes the security protection method and device for maritime combat data based on blockchain according to the embodiments of the present invention with reference to the accompanying drawings. Protection method.

[0064] figure 1 It is a flowchart of a security protection method for maritime combat data based on blockchain in an embodiment of the present invention.

[0065] Such as figure 1 As shown, the security protection method of the blockchain-based maritime combat data includes the following steps...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety protection method and device for sea battle data based on blockchain. The method comprises the steps: constructing a sea military information system model based on blockchain; designing an efficient verifiable PoS consensus mechanism step by step from a static state to a dynamic state; constructing a trusted data storage mechanism with the high dynamic network characteristics; constructing an attack tracing and tracking responsibility seeking mechanism; constructing a privacy protection mechanism for the trusted storage of data. Aiming at the distributed trusted storage, privacy protection and attack tracing demands of the sea formation battle data, a sea formation battle data private chain platform architecture is constructed, effectively meets the actualdemands of cross-region interconnection of safety network information systems at multiple levels, and improves the safety and reliability of the sea battle data safety protection system.

Description

technical field [0001] The present invention relates to the technical field of blockchain security, in particular to a security protection method and device for maritime combat data based on blockchain. Background technique [0002] There are many defects in the traditional combat data security protection system and corresponding management mechanism. The design of the current combat data security protection system mainly relies on traditional network technology. Based on the central data storage and processing method, there are problems such as easy to be attacked by the enemy, easy to expose privacy, and difficult to guarantee security. Therefore, with the rapid development of information technology, the construction of the combat data security protection system must be continuously improved and innovated in order to adapt to the military information confidentiality requirements under the new situation and ensure the smooth progress of our military modernization. [0003]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L9/3218H04L9/3255H04L63/0421H04L67/1097
Inventor 关振宇卞良旭刘建伟李大伟
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products