Network Security Communication System Based on Blockchain Smart Contract

A smart contract and network security technology, applied in the field of digital information transmission, can solve problems such as inability to flexibly control access rights, failure of network access security model, etc., to ensure traceability, avoid manual processes, and avoid the influence of centralization factors Effect

Active Publication Date: 2022-06-24
南京智人云信息技术有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing service architecture, the boundary-based network access security model is gradually ineffective, and the access rights cannot be flexibly controlled.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network Security Communication System Based on Blockchain Smart Contract
  • Network Security Communication System Based on Blockchain Smart Contract
  • Network Security Communication System Based on Blockchain Smart Contract

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0084] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0085] see Figure 1-Figure 7 , in this example:

[0086] A case of using Redis access information as zero-trust network security communication is proposed:

[0087] Since the data is transmitted through the network, it can be intercepted during the transmission process, or enter the database through extraordinary means, so the database security is very important. Redis serves as a data cache storage facility for services, and its s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network security communication system based on a blockchain smart contract, belonging to the technical field of digital information transmission. The system includes a network isolation module, a custom configuration module, an authorized access module, a smart contract module, a certificate management module, an automatic deployment module, and a sentinel verification module; through the network isolation module, the ebpf network firewall is used for network isolation using micro-segmentation technology; Define the configuration module System administrators configure custom resources and authorization rules on the platform and initiate voting; use the authorized access module to enable administrators to vote and manage management events through the custody and security contracts on the blockchain; through the smart contract module Query the contract to obtain the corresponding state change; use the certificate management module to generate the CA certificate; use the automatic deployment module to inject the information of the CA certificate to automatically deploy the client and the sentinel of the service team; use the sentinel verification module to access the specified interface.

Description

technical field [0001] The invention relates to the technical field of digital information transmission, in particular to a network security communication system based on a blockchain smart contract. Background technique [0002] The traditional security model is gradually improved based on the border model. The traditional border-based network security architecture protects the enterprise network border through firewall, WAF, IPS and other border security products / solutions. The perimeter model focuses on defending the perimeter, keeping attackers out as much as possible, with no protection on the inside. In the existing service architecture, the boundary-based network access security model gradually fails, and it cannot flexibly control access rights and other shortcomings. [0003] With the development of business and the increase of traffic, resisting external / internal risks, increasing availability, and achieving a balance between security and availability have become ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/32G06N3/04G06N3/08
CPCH04L63/02H04L63/0263H04L63/10H04L63/0823H04L63/0807H04L63/20H04L9/3263H04L9/3213G06N3/08H04L2209/463G06N3/044
Inventor 李彪陶圣罗浩徐元昌
Owner 南京智人云信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products