Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System resource tamper-proofing method based on block chain and national secret digital fingerprint technology

A technology of digital fingerprints and system resources, applied in digital transmission systems, transmission systems, digital data protection and other directions, can solve problems such as the inability to ensure the uniqueness and credibility of the original resources, the low security factor of the MD5 algorithm, and easy to be attacked.

Active Publication Date: 2020-10-27
江苏开博科技有限公司 +1
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The disadvantages of the above traditional approach: 1. The MD5 algorithm has a low safety factor and is easy to be attacked; 2. The MD5 value stored in the file or database is easy to be stolen or tampered with; 3. For the original resource file stored in a certain location, it is also Because the location of the file is easy to be stolen and exposed, it leads to the problem of artificially replacing and modifying the original resource file, which cannot ensure the uniqueness and credibility of the original resource; 4. The traditional method generally only monitors the tampering of a specific resource, and rarely There is a monitoring mechanism for illegal deletion and illegal addition of resources in the overall system; 5. Traditional methods can only perform localized monitoring of a single system, and cannot form large-scale remote monitoring. The scope of application is small, and repeated investment by customers is large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System resource tamper-proofing method based on block chain and national secret digital fingerprint technology
  • System resource tamper-proofing method based on block chain and national secret digital fingerprint technology
  • System resource tamper-proofing method based on block chain and national secret digital fingerprint technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The present invention is described in further detail now in conjunction with accompanying drawing. These drawings are all simplified schematic diagrams, which only illustrate the basic structure of the present invention in a schematic manner, so they only show the configurations related to the present invention.

[0058] like figure 1As shown, the anti-tampering method of system resources based on block chain and national secret digital fingerprint technology of the present invention comprises the following steps:

[0059] Step a: Resource fingerprint on-chain and source file security backup

[0060] Step a1: File fingerprint on-chain:

[0061] Step a1.1: Set the Genesis module in the target system to generate a policy file; the policy file includes a scanning policy file, a monitoring policy file, an identification policy file, an alarm policy file, a forced restoration policy file and a super administrator intervention policy file, The policy file is generated duri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a system resource tamper-proofing method based on a blockchain and a national password digital fingerprint technology, and belongs to the technical field of system encryption.The method comprises the following steps: step a, resource fingerprint chaining and source file safety backup: step a1, file fingerprint chaining; a2, digital fingerprint sampling is carried out on system resources; a3, encrypting the digital fingerprint by using the national cryptographic certificate of the target system; a4, submitting the encrypted digital fingerprint to a blockchain platform;a5, the source file is safely backed up and stored; b, dynamically monitoring the fingerprint of the resource file: b1, performing fingerprint sampling on the target system resource file to obtain the fingerprint of the target system resource file; b2, obtaining a fingerprint on a source file chain of the target system resource file; b3, comparing the fingerprint of the resource file of the target system with the fingerprint on the source file chain, and if not, giving an alarm; if yes, executing the step c; and c, forcibly restoring the resource file. The safety factor of the system is improved.

Description

technical field [0001] The invention relates to a software system resource management and control method based on a block chain and a national secret algorithm, and belongs to the technical field of system encryption. Background technique [0002] For the software system after it is officially launched, there is a serious problem of malicious components or resources entering the production system caused by illegal deployment of human factors. Under the license management and control mode, there are still hackers who artificially replace components to bypass the license management and control mechanism, which brings serious commercial infringement value damage to software suppliers. For WEB systems, the biggest risk is external malicious attacks, tampering with the content of sensitive parts of the webpage, and causing serious damage to politics, economy, society, etc. [0003] The traditional anti-tampering mechanism of resources is based on the mainstream open source diges...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/64G06F21/60G06F21/62G06F16/182H04L9/06H04L9/32
CPCG06F21/602G06F21/6218G06F21/64G06F16/182H04L9/0643H04L9/3247
Inventor 孟军
Owner 江苏开博科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products