Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Trusted traceability method and system, and storage medium

A blockchain and credible technology, applied in the field of H04L digital information transmission, can solve problems such as inability to effectively open, source data leakage, leakage, etc., to achieve the quality and efficiency of defense, strengthen data security, and break data islands Effect

Active Publication Date: 2022-01-07
江苏移动信息系统集成有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the continuous development of science and technology, the attack methods of network security and data security are also constantly improving. The traditional cyberspace security protection system and data security protection tools are mainly static and cannot realize effective linkage between components. Unable to effectively form a defensive alliance
At the same time, the cyber attackers have formed a certain scale of attack surface. While sharing tools and technologies, they have also reached a certain consensus on attack data, resulting in a passive situation where the defenders face each other.
[0003] For example, the data of the target customer is unique, that is, when the target customer uses it, it has a certain degree of security, but when the authorized customer uses it, due to factors such as network address changes and the strength of the firewall, it is easy to cause the source data of the target customer to leak. It is impossible to protect the security of source data during data sharing, so that target customers dare not open source data easily, and information sharing cannot be realized
[0004] Therefore, in the current situation where network attackers are attacking from all sides, on the one hand, the defender must continuously improve the security protection capabilities of the network by means of stacking devices and strengthening borders, but at the same time, it is worried about its own network information and data information. leaked, the attack information suffered cannot be effectively disclosed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted traceability method and system, and storage medium
  • Trusted traceability method and system, and storage medium
  • Trusted traceability method and system, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Based on the issues of security information protection mentioned in the above background, the present invention is based on the block chain, and simultaneously builds a security capability resource pool and a security information chain, that is, using block The process and corresponding data are traceable, all data are kept in the security capacity resource pool in the local area network, the privacy calculation is performed on the authorized data, the data is desensitized, and the diversity of source data is enhanced, so that a single source data can be obtained from one point Protection, upgrade to line protection, further increase authorized source data, and simultaneously upgrade the capability of the security information chain, so that the source data in the security capability resource pool is further upgraded from line protection to surface protection, thereby further realizing information sharing in the security capability resource pool , making the data in the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a trusted traceability method and system based on blockchain, and a storage medium, and belongs to the field of open use of security data and security results. The method comprises the steps: establishing an initial database, wherein the initial database is open, and the security capability type and the security capability of the initial database can be dynamically expanded; constructing a security information chain in a local area network, carrying out data uplink, process uplink and capability uplink on source data stored in the initial database, constructing a privacy model, and carrying out privacy calculation on the uplink data; credibly opening the security data after privacy calculation, expanding the security data, and upgrading the security data into a security capability resource pool. The method further enriches the security data, process and capability of the uplink, constructs an open tenant defense alliance in the extensive local area network, realizes sharing of security resource pool customer security protection results in the local area network, and is suitable for the field of multi-target customer group security of governments, enterprises and the like.

Description

technical field [0001] The invention belongs to the field of transmission of H04L digital information, in particular to the field of open use of security data and security results, and in particular to a blockchain-based trusted traceability method, system, and storage medium. Background technique [0002] With the continuous development of science and technology, the attack methods of network security and data security are also constantly improving. The traditional cyberspace security protection system and data security protection tools are mainly static and cannot realize effective linkage between components. Defending alliances cannot be effectively formed. At the same time, the cyber attackers have formed a certain scale of attack surface. While sharing tools and technologies, they have also reached a certain consensus on attack data, resulting in a passive situation where the defenders face each other. [0003] For example, the data of the target customer is unique, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F21/57G06F16/27
CPCG06F21/6227G06F21/6245G06F16/27G06F21/577
Inventor 董陵童恩赵挺孙迎春杨鹏金灿朱艳杰
Owner 江苏移动信息系统集成有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products