Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System resource anti-tampering method based on block chain and national secret digital fingerprint technology

A digital fingerprint and system resource technology, applied in the direction of digital transmission system, transmission system, digital data protection, etc., can solve the problem of inability to ensure the uniqueness and credibility of original resources, the inability to form large-scale remote monitoring, and the easy location of files Problems such as theft and exposure, to achieve the effect of improving uniqueness and credibility, improving anti-tampering and anti-repudiation performance, and avoiding repeated investment problems

Active Publication Date: 2021-01-08
江苏开博科技有限公司 +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The disadvantages of the above traditional approach: 1. The MD5 algorithm has a low safety factor and is easy to be attacked; 2. The MD5 value stored in the file or database is easy to be stolen or tampered with; 3. For the original resource file stored in a certain location, it is also Because the location of the file is easy to be stolen and exposed, it leads to the problem of artificially replacing and modifying the original resource file, which cannot ensure the uniqueness and credibility of the original resource; 4. The traditional method generally only monitors the tampering of a specific resource, and rarely There is a monitoring mechanism for illegal deletion and illegal addition of resources in the overall system; 5. Traditional methods can only perform localized monitoring of a single system, and cannot form large-scale remote monitoring. The scope of application is small, and repeated investment by customers is large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System resource anti-tampering method based on block chain and national secret digital fingerprint technology
  • System resource anti-tampering method based on block chain and national secret digital fingerprint technology
  • System resource anti-tampering method based on block chain and national secret digital fingerprint technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The present invention is described in further detail now in conjunction with accompanying drawing. These drawings are all simplified schematic diagrams, which only illustrate the basic structure of the present invention in a schematic manner, so they only show the configurations related to the present invention.

[0058] Such as figure 1As shown, the anti-tampering method of system resources based on block chain and national secret digital fingerprint technology of the present invention comprises the following steps:

[0059] Step a: Resource fingerprint on-chain and source file security backup

[0060] Step a1: File fingerprint on-chain:

[0061] Step a1.1: Set the Genesis module in the target system to generate a policy file; the policy file includes a scanning policy file, a monitoring policy file, an identification policy file, an alarm policy file, a forced restoration policy file and a super administrator intervention policy file, The policy file is generated d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a system resource anti-tampering method based on block chain and national secret digital fingerprint technology, which belongs to the technical field of system encryption. It includes the following steps: step a: resource fingerprint upload and source file security backup: step a1: file fingerprint upload; step a2: digital fingerprint sampling of system resources; step a3: use target system national secret certificate to encrypt digital fingerprint ; Step a4: Submit the encrypted digital fingerprint to the block chain platform; Step a5: Safe backup storage of the source file; Step b: Dynamic monitoring of resource file fingerprints: Step b1: Perform fingerprint sampling on the target system resource file to obtain the target system Resource file fingerprint; step b2: obtain the fingerprint on the source file chain of the target system resource file; step b3: compare the fingerprint on the target system resource file fingerprint and the fingerprint on the source file chain, if they do not match, give an alarm; if they meet the forced restoration strategy, then perform step c; Step c: Resource files are forced to restore. The invention improves the safety factor of the system.

Description

technical field [0001] The invention relates to a software system resource management and control method based on a block chain and a national secret algorithm, and belongs to the technical field of system encryption. Background technique [0002] For the software system after it is officially launched, there is a serious problem of malicious components or resources entering the production system caused by illegal deployment of human factors. Under the license management and control mode, there are still hackers who artificially replace components to bypass the license management and control mechanism, which brings serious commercial infringement value damage to software suppliers. For WEB systems, the biggest risk is external malicious attacks, tampering with the content of sensitive parts of the webpage, and causing serious damage to politics, economy, society, etc. [0003] The traditional anti-tampering mechanism of resources is based on the mainstream open source diges...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/64G06F21/60G06F21/62G06F16/182H04L9/06H04L9/32
CPCG06F21/602G06F21/6218G06F21/64G06F16/182H04L9/0643H04L9/3247
Inventor 孟军
Owner 江苏开博科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products