Industrial Internet data security monitoring method and system based on block chain

An industrial Internet and data security technology, applied in the field of blockchain-based industrial Internet data security monitoring, can solve the problems of central organization failure, intrusion and tampering, verification result falsification, etc., so as to weaken the dependence of institutions and avoid key exchange , the effect of a reliable data base

Active Publication Date: 2020-09-25
HUNAN TIAN HE GUO YUN TECH CO LTD
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the labeling, certificate issuance, and identity authentication of physical devices are confirmed and issued by a centralized organization. Therefore, there are risks of human tampering and failure of the central organization after being invaded.
[0003] At the same time, the process of data storage and sharing may also be tampered with and leaked, requiring irregular data inspections
However, most of the data integrity verification mechanism and security sharing mechanism in the existing technology are based on key exchange technology and third-party verification. During the verification process, a large amount of auxiliary information needs to be stored, and there are problems such as falsification of verification results and key leakage.
[0004] In addition, the log information obtained after each system monitoring and verification is stored on a centralized server, which is also vulnerable to external malicious intrusion and tampering, resulting in no accountability for industrial Internet data security incidents

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial Internet data security monitoring method and system based on block chain
  • Industrial Internet data security monitoring method and system based on block chain
  • Industrial Internet data security monitoring method and system based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with the embodiments and accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.

[0022] For ease of understanding or description, the relevant technical terms involved in the present invention are explained or defined as follows:

[0023] 1. Data Integrity Verification: It refers to the means of proof to verify whether the received data is completely consistent with the original data. Among them, in the integrity verification, it usually uses cryptography to verify the data on the server and the previously stored data. Are the data consistent.

[0024] 2. Homomorphic label: It is a label generated based on homomorphic encryption. In the process of data integrity verificati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an industrial Internet data security monitoring method based on a block chain. The method comprises the following steps that the block chain acquires a homomorphic tag corresponding to monitoring data through an intelligent contract; the block chain opens the access permission of the intelligent contract to an authorization verifier, so that the verifier can obtain the homomorphic tag and send challenge information generated according to the homomorphic tag to the cloud; the block chain opens the access permission of the intelligent contract to the cloud, the cloud can acquire the homomorphic tag and send the certificate generated according to the homomorphic tag and the challenge information to the verifier, so that the verifier can perform comparative analysis according to the certificate to judge whether the integrity of the monitoring data is damaged or not, and a reliable data basis is provided for industrial Internet data security monitoring. The embodiment of the invention further provides an industrial Internet data security monitoring system based on the block chain. According to the invention, reliable protection can be provided for data security of the industrial Internet.

Description

technical field [0001] The invention relates to the technical field of industrial Internet data security, in particular to a block chain-based industrial Internet data security monitoring method and system. Background technique [0002] The data security protection of the Industrial Internet includes the security protection of the data collection side of the physical equipment, the security protection of the data communication network, and the security protection of data storage and sharing. Strong identity authentication of industrial Internet equipment, and then protect the authenticity and credibility of equipment identity from the chip level. However, the labeling, certificate issuance, and identity authentication of physical devices are confirmed and issued by a centralized organization. Therefore, there are risks of human tampering and failure of the central organization after being invaded. [0003] At the same time, the process of data storage and sharing may also b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/00
CPCH04L63/0807H04L63/123H04L9/008
Inventor 黄帅谭林尹海波汪华
Owner HUNAN TIAN HE GUO YUN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products