Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Service data protection method

A technology of business data and communication data, which is applied in the field of industrial Internet, can solve problems such as vulnerability intrusion, influence on the normal operation of the control system, and impact on communication response time, and achieve the effects of low delay, ensuring security and real-time requirements, and ensuring integrity

Pending Publication Date: 2022-01-28
NANJING UNIV OF SCI & TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Most of the existing methods improve communication security through measures such as data encryption, data integrity protection, and identity verification. At the same time, the risk of ubiquitous vulnerabilities in the network domain and system domain will even affect the normal operation of the control system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service data protection method
  • Service data protection method
  • Service data protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] Such as figure 1 , 2 As shown, this embodiment provides a business data protection method based on a trusted measurement model to ensure framework security. The key technology of this model is the Whirlpool method and the improved communication security model based on the Whirlpool method. The specific steps are as follows:

[0039] Step 1: The present invention combines the credibility measurement theory, from the two aspects of the construction of the root of trust and the transmission of the chain of trust, to explain the meaning of the trusted environment model of the industrial Internet network suitable for edge computing, and to formalize it modeling. To ensure the trustworthiness of the edge computing network environment, we must first build a root of trust for it, and form an initial list of trusted devices, trusted Protocol list, trusted connection list, trusted operation list, etc. to construct. Because there are obvious defects in the two mainstream root o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a service data protection method, which comprises the following steps of: providing a service data protection method based on a trusted measurement model to ensure the security of network communication data, and improving a communication security model through a key technology Whirlpool method of the model; secondly, providing a binary code interpretable vulnerability management and control method based on an attention mechanism aiming at vulnerabilities appearing in the model, enabling an input layer as an output vector of a word embedding layer to pass through two convolution layers, enabling output obtained by multiplying the two convolution layers to pass through a ReLU function activation layer, and then obtaining a feature weight through an attention module; multiplying with the feature map before being input into the attention module, and further passing through a global maximum pooling layer; and finally, through the two fully connected layers, carrying out classification probability prediction by using a sigmoid activation function. According to the invention, safe network credible transmission and communication data protection of the industrial internet can be ensured, and the control precision and the overall safety of the industrial internet are improved.

Description

technical field [0001] The invention relates to the technical field of industrial Internet, in particular to a service data protection method. Background technique [0002] With the vigorous development of the industrial Internet, traditional industrial systems have begun to be closely integrated with advanced Internet technologies, and a large number of cloud-edge industrial Internets that are tightly coupled and collaboratively interacted through cyberspace information systems and physical systems are booming, and continue to move towards uncontrolled The user site side is extended. The originally relatively closed and secure industrial control system is exposed to the open Internet environment, which means that the core control system may be attacked at any time while the cloud-edge industrial Internet is improving industrial intelligence and supply chain digitization. Especially under the high real-time and high continuity characteristics of the industrial Internet, the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40G06N3/04G06N3/08
CPCH04L63/123H04L63/126H04L63/1433G06N3/08G06N3/048G06N3/045
Inventor 王盼盼李千目侯君
Owner NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products