CN108134778A - A kind of multipurpose cryptographic system based on cryptographic system virtualization slice - Google Patents
A kind of multipurpose cryptographic system based on cryptographic system virtualization slice Download PDFInfo
- Publication number
- CN108134778A CN108134778A CN201711257622.2A CN201711257622A CN108134778A CN 108134778 A CN108134778 A CN 108134778A CN 201711257622 A CN201711257622 A CN 201711257622A CN 108134778 A CN108134778 A CN 108134778A
- Authority
- CN
- China
- Prior art keywords
- cryptographic
- cryptographic system
- logic
- function
- multipurpose
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses a kind of multipurpose cryptographic systems based on cryptographic system virtualization slice, each encryption device in cryptographic system is invented into multiple logic cryptographic functions, a cryptographic system virtualization slice is collectively formed in the logic cryptographic function for serving same levels same domain, so as to be formed in same set of shared cryptographic system physical infrastructure towards different purposes cipher applications, multiple and different virtual pin systems in different user domain.The invention meets the method for different password usages using " cryptographic system virtualization slice ", has both ensured continuity, flexibility and the scalability of cryptographic system, solves the problems, such as Focus, the static of conventional cipher system;To have been carried out between cryptographic system and cipher application again decoupling and, conventional cipher system for different cipher applications is needed to stack build caused by huge human and material resources and financial resources put into and be greatly lowered.
Description
Technical field
The present invention relates to a kind of multipurpose cryptographic systems based on cryptographic system virtualization slice.
Background technology
Information security for being the vertical industry of representative and key area application with army, public security, electric power and bank etc.,
Information security just seems more important.Password is still to ensure that each vertical industry in China and key area application message safety are most heavy
The technological means wanted.
However the traditional cipher application pattern in China does not keep up with the main trend of information technology ICT fusions tightly, with 5G nets
Network for representative requirement of the novel information system to cipher application and externally provide password contradiction between service ability increasingly
Significantly, there are the problem of be mainly reflected in following two aspects:
First, the features such as the ICT fusions of information technology are mainly reflected in virtualize, serviceization, differentiation and mobilism, from close
The use angle of code, conventional cipher system still can only provide physics, local, single and static cryptographic abilities,
The cryptographic service ability of virtualization, serviceization, differentiation and mobilism can not be provided, this belongs on cryptographic system self-ability
" hard defects ".
Second, the cipher system that the different vertical industry in China and key area build secrecy system is different, presentation is various not
With " chimney ";Even in some specific industry, according to industry user's weave and system and sector application requirement, gone back in its industry
It needs to be further divided into different safe and secret grades(Referred to as " grade ")With different user scope domains(Referred to as " domain "), these
Different " grades " and different " domains " also becomes different " chimney ".According to current conventional thought, these different " chimneys " due to
The required cryptographic algorithm used and agreement, safe class etc. differ, and generally require by building different physics passwords
System realizes, will expend a large amount of research and development, builds and management is put into.This belongs to tight coupling between cryptographic system and cipher application
The problem of crossed belt comes.
As it can be seen that cryptographic technique can not adapt to the trend of information technology ICT fusions, there is an urgent need to externally be provided in password
It is reformed in the pattern of service, to meet the application demand of current and future.
With the appearance of current newest most hot 5G mobile communication system, just to solve the problems, such as above-mentioned two aspect band
Opportunity is carried out.The most representative features of 5G are the introduction of the concept of " network slice ", core concept be by virtualization and
The technology of serviceization fictionalizes multiple logical network on same physical network, to meet various othernesses and dynamic
Use demand, this theory just create condition for the innovation of cryptographic technique itself application model.
Invention content
In order to overcome the disadvantages mentioned above of the prior art, the present invention provides a kind of based on the more of cryptographic system virtualization slice
Purposes cryptographic system uses for reference the thought of " network slice ", the concept of definition " cryptographic system virtualization slice ", by same set of
On the physical infrastructure of cryptographic system, the different virtual pin systems towards different purposes cipher applications are built, towards
Different purposes logically provide the cryptographic abilities of differentiation(Including safe class, user domain range, cryptographic algorithm and agreement,
Random number and key generation and management etc.), substitute a variety of different physics cryptographic systems built in a conventional manner, it is ensured that password
Duration, flexibility and the scalability of system effectively keep up with information technology trend, adapt to ICT convergences, and solve tradition
Cryptographic system puts into the problem of big towards research and development, construction and management in the case of different purposes, quickly, efficiently adapts to different vertical
The cryptography requirements of industry or different application can adapt to following development and variation very well.
The technical solution adopted by the present invention to solve the technical problems is:It is a kind of that slice are virtualized based on cryptographic system more
Each encryption device in cryptographic system is invented multiple logic cryptographic functions by purposes cryptographic system, and same levels are identical
A cryptographic system virtualization slice is collectively formed according to cipher application mode in the logic cryptographic function in domain, multiple common so as to obtain
Enjoy same set of cryptographic system physical infrastructure, different virtual pin systems towards different purposes cipher applications.
Compared with prior art, the positive effect of the present invention is:
By using a kind of system that slice solution multipurpose cipher application is virtualized based on cryptographic system, create makes the present invention
Meet the method for different password usages with " cryptographic system virtualization slice ", both ensure the continuity, flexibly of cryptographic system
Property and scalability, solve the problems, such as conventional cipher system Focus, static configuration;It again should by cryptographic system and password
It has carried out decoupling between and has needed to stack for different cipher applications by conventional cipher system and build caused huge people
Power, material resources and financial resources input are greatly lowered.Suitable for safe and secret more demanding, the flexible industry of service application mode,
Including the crucial industry such as electric power, finance.
Description of the drawings
Examples of the present invention will be described by way of reference to the accompanying drawings, wherein:
Fig. 1 virtualizes conceptual schematic view for encryption device;
Fig. 2 is cryptographic function service conceptual schematic view;
Fig. 3 is the system integration schematic diagram based on cryptographic function service;
Fig. 4 is cryptographic system virtualization slice formwork structure;
Fig. 5 is the canonical system being sliced based on cryptographic systemization for solving multipurpose cipher application.
Specific embodiment
For conventional cipher system provide ability pattern it is static, it is single and research and development, build and management input greatly ask
Topic, the present invention provides a kind of method for being virtualized and being sliced for solving multipurpose cipher application based on cryptographic system, the present invention
A kind of canonical system for virtualizing and being sliced for solving multipurpose cipher application based on cryptographic system is also disclosed, both solves password
" hard defects " on system self-ability, and the close coupling relationship between cryptographic system and cipher application can be eliminated, ensure it is close
While the development of code technology itself, also assure that itself and communication network technology, computer technology and safe practice etc. are respective
Independent development evolution.
The present invention is as follows comprising particular content:
Use for reference the definition of network slice:" network slice is one group of network function with specific wireless configuration and transmission configuration
Set can be that operator provides multiple virtual networks end to end on same set of physical equipment, these network functions can spirit
Any node living for being deployed in network(Access, edge, core), to be adapted to the desired any business model of operator.5G systems
System is sliced to cope with different demands with different networks." as it can be seen that network slice is substantially one group and monopolizes specific money in logic
The function set in source.
In password field, this theory is equally applicable, can be according to the cipher application of different purposes to the object of cryptographic system
It manages the resource that infrastructure carries out in logic to divide, forms the cryptographic function intersection of exclusive specific cryptosystem device resource(Including close
Code physical equipment, cryptographic service function, cryptographic algorithm and agreement, cryptography management function etc.), these cryptographic function intersections may body
Now be for the factors such as different scenes or different safety class cryptographic algorithm and agreement difference, may also be presented as army
The difference of weave and system and specific Military Application user domain.We define " cryptographic system virtualization slice ":" one group with spy
There is the set of the cryptographic function of calculating, storage and password resource distribution, can be provided on same set of physical equipment for user more
A virtual pin system, these cryptographic functions can with flexible deployment the affiliated data center of cryptographic system any node(Entrance,
Core, edge), to be adapted to the desired any cipher application pattern of user and scene.”
Cryptographic system virtualization slice is also involved in following concept.
Encryption device virtualization mechanism mainly uses for reference the ripe virtualization technology thought that traditional cloud computing etc. is representative,
By entrance guard's formula or formula encryption device is called to be virtualized into multiple entrance guard's formulas or calls formula virtual cryptographic equipment.As shown in Figure 1.
Cryptographic function service mechanism mainly uses for reference serviceization and NFV(Network function virtualizes)Thought will localize
Cryptographic function be packaged into the cryptographic function service of networking, as shown in Fig. 2, convenient for cryptographic function service the integrated of itself and
Cryptographic function service is integrated with the other service functions of host system, as shown in Figure 3.
Cryptographic function service orchestration mechanism mainly uses for reference network slice and MANO(It is sliced layout strategy)Thought, will not
Same virtual pin function services get up according to certain rule association and layout, are formed towards the close of different purposes cipher applications
Code system virtualization slice template.The template include a series of virtual pin functional entitys, these virtual pin functional entitys it
Between logical communication link and these virtual pin functional entitys between information flow forward directional diagram.In layout and generation cryptographic system
Virtualization slice CSS(Cipher System Slice)When, it needs to define the formwork structure of layout CSS, definition provides specific clothes
The virtual pin system topological of business, the VCF between virtual link VL, VCF between VCF, VCF and VCF including forming CSS turn
Hair figure VCFFG(VCF Forward Graph)And the elements such as required customization parameters of CS.As shown in Figure 4.
In conclusion this method uses for reference the think of of the technologies such as virtualization, serviceization and the network slice of other field maturation
Think, building completely new cryptographic system in password field virtualizes slice, to be built with same set of physical infrastructure towards not
With the various logic cryptographic systems of purposes.
The present embodiments relate to a kind of allusion quotations for being virtualized and being sliced for solving multipurpose cipher application based on cryptographic system
Type system.It specifically includes:Entrance guard's formula encryption device, call formula encryption device, Password Management equipment, security applications data center,
Password gateway device and various logic cryptographic function service, pass through cipher protocol between each physical equipment and cryptographic service function
Interaction and cooperation password resource.Assuming that by taking 5G systems as an example, four cryptographic systems of structure, which virtualize, in a network is sliced cuts
Piece, " grade " are divided into grade 1 and grade 2, and " domain " is divided into user domain 1 and user domain 2.As shown in Figure 5.
In Fig. 5, four logic entrance guard's formula cryptographic functions are fictionalized on entrance guard's formula encryption device(IP cipher machines), in password
Four logic cryptography management functions are fictionalized in management equipment, it is empty on the calling formula encryption device in security service data center
Drawing up four logics calls formula encryption device and four business service functions that four logic business service functions are collectively formed, mutual
Four logic password gateway functions are fictionalized in logical gateway infrastructure to interconnect with other four virtual Information System Securities respectively
Intercommunication.Logic entrance guard's formula cryptographic function of same levels same domain(Virtual IP address cipher machine), logic cryptography management function, logic industry
Business service function(Formula cryptographic function is called containing logic)And that a cryptographic system is collectively formed is virtual for logic password gateway function
Change slice, share 1 domain 1 of grade, 1 domain 2 of grade, 2 domain 1 of grade and 2 four, 2 domain of grade cryptographic system virtualization slice, they
Share same set of cryptographic system physical infrastructure.
Logic entrance guard's formula cryptographic function provides civilian non-close network and special industry concerning security matters network in logic cryptographic system
Between entrance guard's formula red and black isolation features based on password.
Logic cryptography management function provides identity discriminating, cryptographic service strategy download online, close in logic cryptographic system
The functions such as code resource online distribution and replacement.
Logic business service function provides the security service and application function of special-purpose in logic cryptographic system.
Logic password gateway function provides and the function that interconnects of other cryptographic systems in logic cryptographic system.
A kind of formation has been put forward for the first time for solving the method for multipurpose cipher application based on cryptographic system virtualization slice
The method of cryptographic system virtualization slice, is as follows.
Encryption device each in cryptographic system is carried out local virtualization by step S101 respectively, is formed different virtual
Encryption device;
Step S102 carries out function package to these virtualization encryption devices in a manner that coupling is minimum, forms different sheets
Ground modularization cryptographic function;
Step S103 uses for reference the thought of NFV, and each local component cryptographic function is carried out serviceization encapsulation, forms different nets
The cryptographic function service of network;
Step S104 according to different cipher application demands and purposes, uses for reference the thought of MANO, on demand takes all cryptographic functions
Business is got up according to certain rule association and layout, forms " cryptographic system virtualization slice " template;
Step S105 uses for reference the thought of network slice, and according to the demand and purposes of cipher application, by some, " cryptographic system is virtual
Change slice " template is instantiated, and is formed " cryptographic system virtualization slice " in logic towards certain purposes.
As can be seen from the above-described embodiment, cryptographic system virtualization slice can will fictionalize on different password physical equipments
The association of logic cryptographic function and layout come is got up, and forms a complete logic cryptographic system, so that it is guaranteed that cryptographic system
Continue flexible scalability, while also very significantly reduce conventional cipher system in research and development, construction and managerial throwing
Enter.
Claims (10)
1. a kind of multipurpose cryptographic system based on cryptographic system virtualization slice, it is characterised in that:It will be every in cryptographic system
A encryption device invents multiple logic cryptographic functions, by the logic cryptographic function of same levels same domain be collectively formed one it is close
Code system virtualization slice, so as to obtain it is multiple share same set of cryptographic system physical infrastructures, it is close towards different purposes
The different virtual pin systems of code application.
2. a kind of multipurpose cryptographic system based on cryptographic system virtualization slice according to claim 1, feature exist
In:The encryption device is set including entrance guard's formula encryption device, Password Management equipment, security applications data center and password gateway
It is standby.
3. a kind of multipurpose cryptographic system based on cryptographic system virtualization slice according to claim 2, feature exist
In:Multiple logic entrance guard formula cryptographic functions are fictionalized on entrance guard's formula encryption device;It is empty in the Password Management equipment
Draw up multiple logic cryptography management functions;Multiple logic business service functions are fictionalized in the security applications data center;
Multiple logic password gateway functions are fictionalized on the password gateway device.
4. a kind of multipurpose cryptographic system based on cryptographic system virtualization slice according to claim 3, feature exist
In:The logic business service function is by multiple logic tune for being fictionalized on the calling formula encryption device of security service data center
It is collectively formed with formula encryption device and multiple business service functions.
5. a kind of multipurpose cryptographic system based on cryptographic system virtualization slice according to claim 4, feature exist
In:The logic entrance guard formula cryptographic function provided in logic cryptographic system civilian non-close network and special industry concerning security matters network it
Between entrance guard's formula isolation features based on password.
6. a kind of multipurpose cryptographic system based on cryptographic system virtualization slice according to claim 4, feature exist
In:The logic cryptography management function provides identity discriminating, cryptographic service strategy download online, password in logic cryptographic system
Resource online distribution and replacement function.
7. a kind of multipurpose cryptographic system based on cryptographic system virtualization slice according to claim 4, feature exist
In:The logic business service function provides the security service and application function of special-purpose in logic cryptographic system.
8. a kind of multipurpose cryptographic system based on cryptographic system virtualization slice according to claim 4, feature exist
In:The logic password gateway function provides and the function that interconnects of other cryptographic systems in logic cryptographic system.
9. a kind of multipurpose cryptographic system based on cryptographic system virtualization slice according to claim 1, feature exist
In:The forming method of the cryptographic system virtualization slice includes the following steps:
Step 1: encryption device each in cryptographic system is carried out local virtualization respectively, form different virtual pins and set
It is standby;
Step 2: virtualization encryption device is carried out function package in a manner that coupling is minimum, different local component is formed
Change cryptographic function;
Step 3: each local component cryptographic function is carried out serviceization encapsulation, the cryptographic function clothes of different networkings are formed
Business;
Step 4: according to different cipher application demands and purposes, all cryptographic function service associations and layout are got up, are formed
Cryptographic system virtualization slice template;
Step 5: according to the demand and purposes of cipher application, some cryptographic system is virtualized into slice template and is instantiated, shape
Slice is virtualized into the cryptographic system in logic towards certain purposes.
10. a kind of multipurpose cryptographic system based on cryptographic system virtualization slice according to claim 9, feature exist
In:The cryptographic system virtualization slice template includes a series of virtual pin functional entitys, these virtual pin functional entitys
Between logical communication link and these virtual pin functional entitys between information flow forward directional diagram.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711257622.2A CN108134778B (en) | 2017-12-04 | 2017-12-04 | Multipurpose cryptosystem based on cryptosystem virtualization slice |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711257622.2A CN108134778B (en) | 2017-12-04 | 2017-12-04 | Multipurpose cryptosystem based on cryptosystem virtualization slice |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108134778A true CN108134778A (en) | 2018-06-08 |
CN108134778B CN108134778B (en) | 2021-09-10 |
Family
ID=62390013
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711257622.2A Active CN108134778B (en) | 2017-12-04 | 2017-12-04 | Multipurpose cryptosystem based on cryptosystem virtualization slice |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108134778B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112256411A (en) * | 2020-10-15 | 2021-01-22 | 上海昀层信息技术有限公司 | Intelligent password scheduling system and method |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100082991A1 (en) * | 2008-09-30 | 2010-04-01 | Hewlett-Packard Development Company, L.P. | Trusted key management for virtualized platforms |
US20110246785A1 (en) * | 2010-03-30 | 2011-10-06 | Microsoft Corporation | Hardware supported virtualized cryptographic service |
US20130058478A1 (en) * | 2009-08-31 | 2013-03-07 | International Business Machines Corporation | Virtualization of cryptographic keys |
CN104461678A (en) * | 2014-11-03 | 2015-03-25 | 中国科学院信息工程研究所 | Method and system for providing password service in virtualized environment |
CN105243321A (en) * | 2015-10-27 | 2016-01-13 | 成都卫士通信息产业股份有限公司 | Container virtualization technology based cipher machine, implementation method and working method therefor |
US20160105489A1 (en) * | 2014-10-14 | 2016-04-14 | Alcatel-Lucent Usa Inc. | Distribution of cloud services in a cloud environment |
CN105678156A (en) * | 2016-01-04 | 2016-06-15 | 成都卫士通信息产业股份有限公司 | Cloud cipher service platform based on virtualization technology and working process of platform |
CN106210042A (en) * | 2016-07-11 | 2016-12-07 | 清华大学 | A kind of user based on end to end network section services request selection method |
CN106792692A (en) * | 2016-12-27 | 2017-05-31 | 兴唐通信科技有限公司 | A kind of physics dicing method based on SDN technologies |
CN106850695A (en) * | 2017-04-07 | 2017-06-13 | 国家计算机网络与信息安全管理中心 | Strange land isomery virtualized management method, apparatus and system under a kind of cloud computing environment |
-
2017
- 2017-12-04 CN CN201711257622.2A patent/CN108134778B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100082991A1 (en) * | 2008-09-30 | 2010-04-01 | Hewlett-Packard Development Company, L.P. | Trusted key management for virtualized platforms |
US20130058478A1 (en) * | 2009-08-31 | 2013-03-07 | International Business Machines Corporation | Virtualization of cryptographic keys |
US20110246785A1 (en) * | 2010-03-30 | 2011-10-06 | Microsoft Corporation | Hardware supported virtualized cryptographic service |
US20160105489A1 (en) * | 2014-10-14 | 2016-04-14 | Alcatel-Lucent Usa Inc. | Distribution of cloud services in a cloud environment |
CN104461678A (en) * | 2014-11-03 | 2015-03-25 | 中国科学院信息工程研究所 | Method and system for providing password service in virtualized environment |
CN105243321A (en) * | 2015-10-27 | 2016-01-13 | 成都卫士通信息产业股份有限公司 | Container virtualization technology based cipher machine, implementation method and working method therefor |
CN105678156A (en) * | 2016-01-04 | 2016-06-15 | 成都卫士通信息产业股份有限公司 | Cloud cipher service platform based on virtualization technology and working process of platform |
CN106210042A (en) * | 2016-07-11 | 2016-12-07 | 清华大学 | A kind of user based on end to end network section services request selection method |
CN106792692A (en) * | 2016-12-27 | 2017-05-31 | 兴唐通信科技有限公司 | A kind of physics dicing method based on SDN technologies |
CN106850695A (en) * | 2017-04-07 | 2017-06-13 | 国家计算机网络与信息安全管理中心 | Strange land isomery virtualized management method, apparatus and system under a kind of cloud computing environment |
Non-Patent Citations (1)
Title |
---|
李健航: "可信密码模块(TCM)芯片的虚拟化设计", 《信息网络安全》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112256411A (en) * | 2020-10-15 | 2021-01-22 | 上海昀层信息技术有限公司 | Intelligent password scheduling system and method |
CN112256411B (en) * | 2020-10-15 | 2024-02-27 | 上海昀层信息技术有限公司 | Intelligent password scheduling system and method |
Also Published As
Publication number | Publication date |
---|---|
CN108134778B (en) | 2021-09-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107153565B (en) | Method for configuring resource and network equipment thereof | |
CN105577637B (en) | Calculating equipment, method and machine readable storage medium for being communicated between secured virtual network function | |
US20190123963A1 (en) | Method and apparatus for managing resources of network slice | |
Gheisari et al. | ECA: An edge computing architecture for privacy-preserving in IoT-based smart city | |
CN108282352A (en) | Manage the methods, devices and systems of network slice example | |
CN106792692B (en) | A kind of physics dicing method based on SDN technology | |
Zhang et al. | Blockchain and federated deep reinforcement learning based secure cloud-edge-end collaboration in power IoT | |
EP3550786B1 (en) | Certificate acquisition method, authentication method and network device | |
CN103973578B (en) | The method and device that a kind of virtual machine traffic redirects | |
CN114978638B (en) | Block chain cross-chain supervision method based on shared node | |
CN112749812A (en) | Joint learning system, training result aggregation method and equipment | |
CN105224385A (en) | A kind of virtualization system based on cloud computing and method | |
WO2021037133A1 (en) | Network management method and device | |
CN113472575B (en) | Deployment method and device of open virtual network | |
CN112866380A (en) | Chain network architecture based on block chain | |
CN107969017A (en) | Realize the method and system of network section | |
CN103237020A (en) | Attack avoidance method for state machine, server, and switch | |
WO2020042929A1 (en) | Block chain system | |
CN110933015B (en) | Data transmission method, device and system | |
CN113259464B (en) | Method for building block chain sub-network and block chain system | |
CN108134778A (en) | A kind of multipurpose cryptographic system based on cryptographic system virtualization slice | |
Chen et al. | Blockchain-based optical network slice rental approach for IoT | |
Dubey et al. | Security in hybrid cloud | |
CN104901799B (en) | A kind of method and device for realizing SDN certificate resource distribution | |
CN104102524A (en) | Method for realizing virtual secure element (VSE) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |