Network security communication system based on block chain smart contract

A smart contract and network security technology, applied in the field of digital information transmission, can solve problems such as inability to flexibly control access rights, failure of network access security model, etc., to ensure traceability, avoid manual processes, and avoid the influence of centralization factors Effect

Active Publication Date: 2022-05-03
南京智人云信息技术有限公司
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing service architecture, the boundary-based network access security m

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security communication system based on block chain smart contract
  • Network security communication system based on block chain smart contract
  • Network security communication system based on block chain smart contract

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0084] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0085] see Figure 1-Figure 7 , in this example:

[0086] A case of using Redis access information as zero-trust network security communication is proposed:

[0087] Since the data is transmitted through the network, it can be intercepted during the transmission process, or enter the database through extraordinary means, so the database security is very important. Redis serves as a data cache storage facility for services, and its s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network security communication system based on a block chain smart contract, and belongs to the technical field of digital information transmission. The system comprises a network isolation module, a user-defined configuration module, an authorized access module, an intelligent contract module, a certificate management module, an automatic deployment module and a sentry verification module. Network isolation is carried out through a network isolation module by adopting an ebpf network firewall and utilizing a micro-segmentation technology; through the custom configuration module, a system administrator configures custom resources and authorization rules on the platform and initiates voting; the administrator votes and manages the management event through the trusteeship and security contract on the block chain by using the authorization access module; querying a contract through an intelligent contract module to obtain a corresponding state change; generating a CA certificate by using a certificate management module; automatically deploying a client and a service team sentinel by using an automatic deployment module according to CA certificate information injection; and the guard verification module is used for accessing a specified interface.

Description

technical field [0001] The invention relates to the technical field of digital information transmission, in particular to a network security communication system based on blockchain smart contracts. Background technique [0002] The traditional security model is gradually improved based on the boundary model. The traditional boundary-based network security architecture uses firewalls, WAF, IPS and other boundary security products / solutions to protect the enterprise network boundary. The perimeter model focuses on defending the perimeter, keeping attackers out as much as possible, leaving nothing inside. In the existing service architecture, the boundary-based network access security model is gradually ineffective, and there are shortcomings such as inability to flexibly control access rights. [0003] With the development of business and the increase of traffic, resisting external / internal risks, increasing availability, and achieving a balance between security and availabi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40H04L9/32G06N3/04G06N3/08
CPCH04L63/02H04L63/0263H04L63/10H04L63/0823H04L63/0807H04L63/20H04L9/3263H04L9/3213G06N3/08H04L2209/463G06N3/044
Inventor 李彪陶圣罗浩徐元昌
Owner 南京智人云信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products