CN108134778A - A kind of multipurpose cryptographic system based on cryptographic system virtualization slice - Google Patents

A kind of multipurpose cryptographic system based on cryptographic system virtualization slice Download PDF

Info

Publication number
CN108134778A
CN108134778A CN201711257622.2A CN201711257622A CN108134778A CN 108134778 A CN108134778 A CN 108134778A CN 201711257622 A CN201711257622 A CN 201711257622A CN 108134778 A CN108134778 A CN 108134778A
Authority
CN
China
Prior art keywords
cryptographic
cryptographic system
logic
function
multipurpose
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711257622.2A
Other languages
Chinese (zh)
Other versions
CN108134778B (en
Inventor
王俊
田永春
陈福莉
郭斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CETC 30 Research Institute
Chengdu Westone Information Industry Inc
Original Assignee
CETC 30 Research Institute
Chengdu Westone Information Industry Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CETC 30 Research Institute, Chengdu Westone Information Industry Inc filed Critical CETC 30 Research Institute
Priority to CN201711257622.2A priority Critical patent/CN108134778B/en
Publication of CN108134778A publication Critical patent/CN108134778A/en
Application granted granted Critical
Publication of CN108134778B publication Critical patent/CN108134778B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a kind of multipurpose cryptographic systems based on cryptographic system virtualization slice, each encryption device in cryptographic system is invented into multiple logic cryptographic functions, a cryptographic system virtualization slice is collectively formed in the logic cryptographic function for serving same levels same domain, so as to be formed in same set of shared cryptographic system physical infrastructure towards different purposes cipher applications, multiple and different virtual pin systems in different user domain.The invention meets the method for different password usages using " cryptographic system virtualization slice ", has both ensured continuity, flexibility and the scalability of cryptographic system, solves the problems, such as Focus, the static of conventional cipher system;To have been carried out between cryptographic system and cipher application again decoupling and, conventional cipher system for different cipher applications is needed to stack build caused by huge human and material resources and financial resources put into and be greatly lowered.

Description

A kind of multipurpose cryptographic system based on cryptographic system virtualization slice
Technical field
The present invention relates to a kind of multipurpose cryptographic systems based on cryptographic system virtualization slice.
Background technology
Information security for being the vertical industry of representative and key area application with army, public security, electric power and bank etc., Information security just seems more important.Password is still to ensure that each vertical industry in China and key area application message safety are most heavy The technological means wanted.
However the traditional cipher application pattern in China does not keep up with the main trend of information technology ICT fusions tightly, with 5G nets Network for representative requirement of the novel information system to cipher application and externally provide password contradiction between service ability increasingly Significantly, there are the problem of be mainly reflected in following two aspects:
First, the features such as the ICT fusions of information technology are mainly reflected in virtualize, serviceization, differentiation and mobilism, from close The use angle of code, conventional cipher system still can only provide physics, local, single and static cryptographic abilities, The cryptographic service ability of virtualization, serviceization, differentiation and mobilism can not be provided, this belongs on cryptographic system self-ability " hard defects ".
Second, the cipher system that the different vertical industry in China and key area build secrecy system is different, presentation is various not With " chimney ";Even in some specific industry, according to industry user's weave and system and sector application requirement, gone back in its industry It needs to be further divided into different safe and secret grades(Referred to as " grade ")With different user scope domains(Referred to as " domain "), these Different " grades " and different " domains " also becomes different " chimney ".According to current conventional thought, these different " chimneys " due to The required cryptographic algorithm used and agreement, safe class etc. differ, and generally require by building different physics passwords System realizes, will expend a large amount of research and development, builds and management is put into.This belongs to tight coupling between cryptographic system and cipher application The problem of crossed belt comes.
As it can be seen that cryptographic technique can not adapt to the trend of information technology ICT fusions, there is an urgent need to externally be provided in password It is reformed in the pattern of service, to meet the application demand of current and future.
With the appearance of current newest most hot 5G mobile communication system, just to solve the problems, such as above-mentioned two aspect band Opportunity is carried out.The most representative features of 5G are the introduction of the concept of " network slice ", core concept be by virtualization and The technology of serviceization fictionalizes multiple logical network on same physical network, to meet various othernesses and dynamic Use demand, this theory just create condition for the innovation of cryptographic technique itself application model.
Invention content
In order to overcome the disadvantages mentioned above of the prior art, the present invention provides a kind of based on the more of cryptographic system virtualization slice Purposes cryptographic system uses for reference the thought of " network slice ", the concept of definition " cryptographic system virtualization slice ", by same set of On the physical infrastructure of cryptographic system, the different virtual pin systems towards different purposes cipher applications are built, towards Different purposes logically provide the cryptographic abilities of differentiation(Including safe class, user domain range, cryptographic algorithm and agreement, Random number and key generation and management etc.), substitute a variety of different physics cryptographic systems built in a conventional manner, it is ensured that password Duration, flexibility and the scalability of system effectively keep up with information technology trend, adapt to ICT convergences, and solve tradition Cryptographic system puts into the problem of big towards research and development, construction and management in the case of different purposes, quickly, efficiently adapts to different vertical The cryptography requirements of industry or different application can adapt to following development and variation very well.
The technical solution adopted by the present invention to solve the technical problems is:It is a kind of that slice are virtualized based on cryptographic system more Each encryption device in cryptographic system is invented multiple logic cryptographic functions by purposes cryptographic system, and same levels are identical A cryptographic system virtualization slice is collectively formed according to cipher application mode in the logic cryptographic function in domain, multiple common so as to obtain Enjoy same set of cryptographic system physical infrastructure, different virtual pin systems towards different purposes cipher applications.
Compared with prior art, the positive effect of the present invention is:
By using a kind of system that slice solution multipurpose cipher application is virtualized based on cryptographic system, create makes the present invention Meet the method for different password usages with " cryptographic system virtualization slice ", both ensure the continuity, flexibly of cryptographic system Property and scalability, solve the problems, such as conventional cipher system Focus, static configuration;It again should by cryptographic system and password It has carried out decoupling between and has needed to stack for different cipher applications by conventional cipher system and build caused huge people Power, material resources and financial resources input are greatly lowered.Suitable for safe and secret more demanding, the flexible industry of service application mode, Including the crucial industry such as electric power, finance.
Description of the drawings
Examples of the present invention will be described by way of reference to the accompanying drawings, wherein:
Fig. 1 virtualizes conceptual schematic view for encryption device;
Fig. 2 is cryptographic function service conceptual schematic view;
Fig. 3 is the system integration schematic diagram based on cryptographic function service;
Fig. 4 is cryptographic system virtualization slice formwork structure;
Fig. 5 is the canonical system being sliced based on cryptographic systemization for solving multipurpose cipher application.
Specific embodiment
For conventional cipher system provide ability pattern it is static, it is single and research and development, build and management input greatly ask Topic, the present invention provides a kind of method for being virtualized and being sliced for solving multipurpose cipher application based on cryptographic system, the present invention A kind of canonical system for virtualizing and being sliced for solving multipurpose cipher application based on cryptographic system is also disclosed, both solves password " hard defects " on system self-ability, and the close coupling relationship between cryptographic system and cipher application can be eliminated, ensure it is close While the development of code technology itself, also assure that itself and communication network technology, computer technology and safe practice etc. are respective Independent development evolution.
The present invention is as follows comprising particular content:
Use for reference the definition of network slice:" network slice is one group of network function with specific wireless configuration and transmission configuration Set can be that operator provides multiple virtual networks end to end on same set of physical equipment, these network functions can spirit Any node living for being deployed in network(Access, edge, core), to be adapted to the desired any business model of operator.5G systems System is sliced to cope with different demands with different networks." as it can be seen that network slice is substantially one group and monopolizes specific money in logic The function set in source.
In password field, this theory is equally applicable, can be according to the cipher application of different purposes to the object of cryptographic system It manages the resource that infrastructure carries out in logic to divide, forms the cryptographic function intersection of exclusive specific cryptosystem device resource(Including close Code physical equipment, cryptographic service function, cryptographic algorithm and agreement, cryptography management function etc.), these cryptographic function intersections may body Now be for the factors such as different scenes or different safety class cryptographic algorithm and agreement difference, may also be presented as army The difference of weave and system and specific Military Application user domain.We define " cryptographic system virtualization slice ":" one group with spy There is the set of the cryptographic function of calculating, storage and password resource distribution, can be provided on same set of physical equipment for user more A virtual pin system, these cryptographic functions can with flexible deployment the affiliated data center of cryptographic system any node(Entrance, Core, edge), to be adapted to the desired any cipher application pattern of user and scene.”
Cryptographic system virtualization slice is also involved in following concept.
Encryption device virtualization mechanism mainly uses for reference the ripe virtualization technology thought that traditional cloud computing etc. is representative, By entrance guard's formula or formula encryption device is called to be virtualized into multiple entrance guard's formulas or calls formula virtual cryptographic equipment.As shown in Figure 1.
Cryptographic function service mechanism mainly uses for reference serviceization and NFV(Network function virtualizes)Thought will localize Cryptographic function be packaged into the cryptographic function service of networking, as shown in Fig. 2, convenient for cryptographic function service the integrated of itself and Cryptographic function service is integrated with the other service functions of host system, as shown in Figure 3.
Cryptographic function service orchestration mechanism mainly uses for reference network slice and MANO(It is sliced layout strategy)Thought, will not Same virtual pin function services get up according to certain rule association and layout, are formed towards the close of different purposes cipher applications Code system virtualization slice template.The template include a series of virtual pin functional entitys, these virtual pin functional entitys it Between logical communication link and these virtual pin functional entitys between information flow forward directional diagram.In layout and generation cryptographic system Virtualization slice CSS(Cipher System Slice)When, it needs to define the formwork structure of layout CSS, definition provides specific clothes The virtual pin system topological of business, the VCF between virtual link VL, VCF between VCF, VCF and VCF including forming CSS turn Hair figure VCFFG(VCF Forward Graph)And the elements such as required customization parameters of CS.As shown in Figure 4.
In conclusion this method uses for reference the think of of the technologies such as virtualization, serviceization and the network slice of other field maturation Think, building completely new cryptographic system in password field virtualizes slice, to be built with same set of physical infrastructure towards not With the various logic cryptographic systems of purposes.
The present embodiments relate to a kind of allusion quotations for being virtualized and being sliced for solving multipurpose cipher application based on cryptographic system Type system.It specifically includes:Entrance guard's formula encryption device, call formula encryption device, Password Management equipment, security applications data center, Password gateway device and various logic cryptographic function service, pass through cipher protocol between each physical equipment and cryptographic service function Interaction and cooperation password resource.Assuming that by taking 5G systems as an example, four cryptographic systems of structure, which virtualize, in a network is sliced cuts Piece, " grade " are divided into grade 1 and grade 2, and " domain " is divided into user domain 1 and user domain 2.As shown in Figure 5.
In Fig. 5, four logic entrance guard's formula cryptographic functions are fictionalized on entrance guard's formula encryption device(IP cipher machines), in password Four logic cryptography management functions are fictionalized in management equipment, it is empty on the calling formula encryption device in security service data center Drawing up four logics calls formula encryption device and four business service functions that four logic business service functions are collectively formed, mutual Four logic password gateway functions are fictionalized in logical gateway infrastructure to interconnect with other four virtual Information System Securities respectively Intercommunication.Logic entrance guard's formula cryptographic function of same levels same domain(Virtual IP address cipher machine), logic cryptography management function, logic industry Business service function(Formula cryptographic function is called containing logic)And that a cryptographic system is collectively formed is virtual for logic password gateway function Change slice, share 1 domain 1 of grade, 1 domain 2 of grade, 2 domain 1 of grade and 2 four, 2 domain of grade cryptographic system virtualization slice, they Share same set of cryptographic system physical infrastructure.
Logic entrance guard's formula cryptographic function provides civilian non-close network and special industry concerning security matters network in logic cryptographic system Between entrance guard's formula red and black isolation features based on password.
Logic cryptography management function provides identity discriminating, cryptographic service strategy download online, close in logic cryptographic system The functions such as code resource online distribution and replacement.
Logic business service function provides the security service and application function of special-purpose in logic cryptographic system.
Logic password gateway function provides and the function that interconnects of other cryptographic systems in logic cryptographic system.
A kind of formation has been put forward for the first time for solving the method for multipurpose cipher application based on cryptographic system virtualization slice The method of cryptographic system virtualization slice, is as follows.
Encryption device each in cryptographic system is carried out local virtualization by step S101 respectively, is formed different virtual Encryption device;
Step S102 carries out function package to these virtualization encryption devices in a manner that coupling is minimum, forms different sheets Ground modularization cryptographic function;
Step S103 uses for reference the thought of NFV, and each local component cryptographic function is carried out serviceization encapsulation, forms different nets The cryptographic function service of network;
Step S104 according to different cipher application demands and purposes, uses for reference the thought of MANO, on demand takes all cryptographic functions Business is got up according to certain rule association and layout, forms " cryptographic system virtualization slice " template;
Step S105 uses for reference the thought of network slice, and according to the demand and purposes of cipher application, by some, " cryptographic system is virtual Change slice " template is instantiated, and is formed " cryptographic system virtualization slice " in logic towards certain purposes.
As can be seen from the above-described embodiment, cryptographic system virtualization slice can will fictionalize on different password physical equipments The association of logic cryptographic function and layout come is got up, and forms a complete logic cryptographic system, so that it is guaranteed that cryptographic system Continue flexible scalability, while also very significantly reduce conventional cipher system in research and development, construction and managerial throwing Enter.

Claims (10)

1. a kind of multipurpose cryptographic system based on cryptographic system virtualization slice, it is characterised in that:It will be every in cryptographic system A encryption device invents multiple logic cryptographic functions, by the logic cryptographic function of same levels same domain be collectively formed one it is close Code system virtualization slice, so as to obtain it is multiple share same set of cryptographic system physical infrastructures, it is close towards different purposes The different virtual pin systems of code application.
2. a kind of multipurpose cryptographic system based on cryptographic system virtualization slice according to claim 1, feature exist In:The encryption device is set including entrance guard's formula encryption device, Password Management equipment, security applications data center and password gateway It is standby.
3. a kind of multipurpose cryptographic system based on cryptographic system virtualization slice according to claim 2, feature exist In:Multiple logic entrance guard formula cryptographic functions are fictionalized on entrance guard's formula encryption device;It is empty in the Password Management equipment Draw up multiple logic cryptography management functions;Multiple logic business service functions are fictionalized in the security applications data center; Multiple logic password gateway functions are fictionalized on the password gateway device.
4. a kind of multipurpose cryptographic system based on cryptographic system virtualization slice according to claim 3, feature exist In:The logic business service function is by multiple logic tune for being fictionalized on the calling formula encryption device of security service data center It is collectively formed with formula encryption device and multiple business service functions.
5. a kind of multipurpose cryptographic system based on cryptographic system virtualization slice according to claim 4, feature exist In:The logic entrance guard formula cryptographic function provided in logic cryptographic system civilian non-close network and special industry concerning security matters network it Between entrance guard's formula isolation features based on password.
6. a kind of multipurpose cryptographic system based on cryptographic system virtualization slice according to claim 4, feature exist In:The logic cryptography management function provides identity discriminating, cryptographic service strategy download online, password in logic cryptographic system Resource online distribution and replacement function.
7. a kind of multipurpose cryptographic system based on cryptographic system virtualization slice according to claim 4, feature exist In:The logic business service function provides the security service and application function of special-purpose in logic cryptographic system.
8. a kind of multipurpose cryptographic system based on cryptographic system virtualization slice according to claim 4, feature exist In:The logic password gateway function provides and the function that interconnects of other cryptographic systems in logic cryptographic system.
9. a kind of multipurpose cryptographic system based on cryptographic system virtualization slice according to claim 1, feature exist In:The forming method of the cryptographic system virtualization slice includes the following steps:
Step 1: encryption device each in cryptographic system is carried out local virtualization respectively, form different virtual pins and set It is standby;
Step 2: virtualization encryption device is carried out function package in a manner that coupling is minimum, different local component is formed Change cryptographic function;
Step 3: each local component cryptographic function is carried out serviceization encapsulation, the cryptographic function clothes of different networkings are formed Business;
Step 4: according to different cipher application demands and purposes, all cryptographic function service associations and layout are got up, are formed Cryptographic system virtualization slice template;
Step 5: according to the demand and purposes of cipher application, some cryptographic system is virtualized into slice template and is instantiated, shape Slice is virtualized into the cryptographic system in logic towards certain purposes.
10. a kind of multipurpose cryptographic system based on cryptographic system virtualization slice according to claim 9, feature exist In:The cryptographic system virtualization slice template includes a series of virtual pin functional entitys, these virtual pin functional entitys Between logical communication link and these virtual pin functional entitys between information flow forward directional diagram.
CN201711257622.2A 2017-12-04 2017-12-04 Multipurpose cryptosystem based on cryptosystem virtualization slice Active CN108134778B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711257622.2A CN108134778B (en) 2017-12-04 2017-12-04 Multipurpose cryptosystem based on cryptosystem virtualization slice

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711257622.2A CN108134778B (en) 2017-12-04 2017-12-04 Multipurpose cryptosystem based on cryptosystem virtualization slice

Publications (2)

Publication Number Publication Date
CN108134778A true CN108134778A (en) 2018-06-08
CN108134778B CN108134778B (en) 2021-09-10

Family

ID=62390013

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711257622.2A Active CN108134778B (en) 2017-12-04 2017-12-04 Multipurpose cryptosystem based on cryptosystem virtualization slice

Country Status (1)

Country Link
CN (1) CN108134778B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112256411A (en) * 2020-10-15 2021-01-22 上海昀层信息技术有限公司 Intelligent password scheduling system and method

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100082991A1 (en) * 2008-09-30 2010-04-01 Hewlett-Packard Development Company, L.P. Trusted key management for virtualized platforms
US20110246785A1 (en) * 2010-03-30 2011-10-06 Microsoft Corporation Hardware supported virtualized cryptographic service
US20130058478A1 (en) * 2009-08-31 2013-03-07 International Business Machines Corporation Virtualization of cryptographic keys
CN104461678A (en) * 2014-11-03 2015-03-25 中国科学院信息工程研究所 Method and system for providing password service in virtualized environment
CN105243321A (en) * 2015-10-27 2016-01-13 成都卫士通信息产业股份有限公司 Container virtualization technology based cipher machine, implementation method and working method therefor
US20160105489A1 (en) * 2014-10-14 2016-04-14 Alcatel-Lucent Usa Inc. Distribution of cloud services in a cloud environment
CN105678156A (en) * 2016-01-04 2016-06-15 成都卫士通信息产业股份有限公司 Cloud cipher service platform based on virtualization technology and working process of platform
CN106210042A (en) * 2016-07-11 2016-12-07 清华大学 A kind of user based on end to end network section services request selection method
CN106792692A (en) * 2016-12-27 2017-05-31 兴唐通信科技有限公司 A kind of physics dicing method based on SDN technologies
CN106850695A (en) * 2017-04-07 2017-06-13 国家计算机网络与信息安全管理中心 Strange land isomery virtualized management method, apparatus and system under a kind of cloud computing environment

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100082991A1 (en) * 2008-09-30 2010-04-01 Hewlett-Packard Development Company, L.P. Trusted key management for virtualized platforms
US20130058478A1 (en) * 2009-08-31 2013-03-07 International Business Machines Corporation Virtualization of cryptographic keys
US20110246785A1 (en) * 2010-03-30 2011-10-06 Microsoft Corporation Hardware supported virtualized cryptographic service
US20160105489A1 (en) * 2014-10-14 2016-04-14 Alcatel-Lucent Usa Inc. Distribution of cloud services in a cloud environment
CN104461678A (en) * 2014-11-03 2015-03-25 中国科学院信息工程研究所 Method and system for providing password service in virtualized environment
CN105243321A (en) * 2015-10-27 2016-01-13 成都卫士通信息产业股份有限公司 Container virtualization technology based cipher machine, implementation method and working method therefor
CN105678156A (en) * 2016-01-04 2016-06-15 成都卫士通信息产业股份有限公司 Cloud cipher service platform based on virtualization technology and working process of platform
CN106210042A (en) * 2016-07-11 2016-12-07 清华大学 A kind of user based on end to end network section services request selection method
CN106792692A (en) * 2016-12-27 2017-05-31 兴唐通信科技有限公司 A kind of physics dicing method based on SDN technologies
CN106850695A (en) * 2017-04-07 2017-06-13 国家计算机网络与信息安全管理中心 Strange land isomery virtualized management method, apparatus and system under a kind of cloud computing environment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李健航: "可信密码模块(TCM)芯片的虚拟化设计", 《信息网络安全》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112256411A (en) * 2020-10-15 2021-01-22 上海昀层信息技术有限公司 Intelligent password scheduling system and method
CN112256411B (en) * 2020-10-15 2024-02-27 上海昀层信息技术有限公司 Intelligent password scheduling system and method

Also Published As

Publication number Publication date
CN108134778B (en) 2021-09-10

Similar Documents

Publication Publication Date Title
CN107153565B (en) Method for configuring resource and network equipment thereof
CN105577637B (en) Calculating equipment, method and machine readable storage medium for being communicated between secured virtual network function
US20190123963A1 (en) Method and apparatus for managing resources of network slice
Gheisari et al. ECA: An edge computing architecture for privacy-preserving in IoT-based smart city
CN108282352A (en) Manage the methods, devices and systems of network slice example
CN106792692B (en) A kind of physics dicing method based on SDN technology
Zhang et al. Blockchain and federated deep reinforcement learning based secure cloud-edge-end collaboration in power IoT
EP3550786B1 (en) Certificate acquisition method, authentication method and network device
CN103973578B (en) The method and device that a kind of virtual machine traffic redirects
CN114978638B (en) Block chain cross-chain supervision method based on shared node
CN112749812A (en) Joint learning system, training result aggregation method and equipment
CN105224385A (en) A kind of virtualization system based on cloud computing and method
WO2021037133A1 (en) Network management method and device
CN113472575B (en) Deployment method and device of open virtual network
CN112866380A (en) Chain network architecture based on block chain
CN107969017A (en) Realize the method and system of network section
CN103237020A (en) Attack avoidance method for state machine, server, and switch
WO2020042929A1 (en) Block chain system
CN110933015B (en) Data transmission method, device and system
CN113259464B (en) Method for building block chain sub-network and block chain system
CN108134778A (en) A kind of multipurpose cryptographic system based on cryptographic system virtualization slice
Chen et al. Blockchain-based optical network slice rental approach for IoT
Dubey et al. Security in hybrid cloud
CN104901799B (en) A kind of method and device for realizing SDN certificate resource distribution
CN104102524A (en) Method for realizing virtual secure element (VSE)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant