CN111711619A - Block chain-based network security connection system - Google Patents

Block chain-based network security connection system Download PDF

Info

Publication number
CN111711619A
CN111711619A CN202010502275.0A CN202010502275A CN111711619A CN 111711619 A CN111711619 A CN 111711619A CN 202010502275 A CN202010502275 A CN 202010502275A CN 111711619 A CN111711619 A CN 111711619A
Authority
CN
China
Prior art keywords
module
transmission
network
information
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010502275.0A
Other languages
Chinese (zh)
Inventor
翁晓泳
王剑
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Rongzer Information Technology Co Ltd
Original Assignee
Jiangsu Rongzer Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Rongzer Information Technology Co Ltd filed Critical Jiangsu Rongzer Information Technology Co Ltd
Priority to CN202010502275.0A priority Critical patent/CN111711619A/en
Publication of CN111711619A publication Critical patent/CN111711619A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Abstract

The invention discloses a network security connection system based on a block chain, which comprises a network terminal, an active authority, a passive authority and a block chain network, wherein the active authority and the passive authority are in operated relation with the network terminal, the output end of the active authority is connected with the input end of the block chain network, and the output end of the block chain network is connected with the input end of the passive authority. This network security connected system based on block chain, at first this system has two kinds of authority modes, both can only change, can not exist simultaneously, like this in the use, just can avoid appearing omitting the file, file and information are sent by mistake, perhaps file information is too much, influence the problem of network security, and in the use, block chain network inside has multiple module, can be fine encrypt file and information, only can untie under specific circumstances, help file and information that so not only can be accurate transmit, increase the accuracy of butt joint.

Description

Block chain-based network security connection system
Technical Field
The invention relates to the technical field of network security, in particular to a network security connection system based on a block chain.
Background
The network security refers to that the hardware, software and data in the system of the network system are protected and are not damaged, changed and leaked due to accidental or malicious reasons, the system continuously, reliably and normally operates, and the network service is not interrupted. The network security has the characteristics of confidentiality, integrity, availability, controllability and censorability, and the specific meaning of the network security can change along with the change of the angle. Such as: from the perspective of users (individuals, businesses, etc.), they desire that information relating to personal privacy or commercial interests be protected from confidentiality, integrity, and authenticity when transmitted over a network. From the perspective of enterprises, the most important is the security encryption and protection on internal information, and with the rapid development of computer technology, information networks have become an important guarantee for social development. There are many sensitive information, even national secrets. It is inevitable to attract various human attacks from all over the world (e.g., information leakage, information theft, data tampering, data deletion and addition, computer viruses, etc.). At the same time, network entities are also subject to such aspects as flood, fire, earthquake, electromagnetic radiation, etc.
However, in the process of information and file transmission, the existing network security often cannot ensure the security of the file, and is easily intercepted or maliciously attacked, which causes information leakage and loss of enterprises and individuals, and the general security connection system has low execution force, is not beneficial to protecting the information and the file in an all-round manner, and increases the efficiency of information transmission.
Disclosure of Invention
The invention aims to provide a network security connection system based on a block chain, which aims to solve the problems that the existing network security in the background technology can not ensure the security of files, is easy to intercept or is maliciously attacked, causes information leakage and causes enterprise and personal loss, and a general security connection system has low executive force, is not beneficial to protecting information and files in an all-round way and increases the information transmission efficiency.
In order to achieve the purpose, the invention provides the following technical scheme: a network security connection system based on a block chain comprises a network terminal, a main authority, a passive authority and a block chain network, wherein the main authority and the passive authority are in a running relation with the network terminal, the output end of the main authority is connected with the input end of the block chain network, and the output end of the block chain network is connected with the input end of the passive authority;
the inside historical transmission module, compression encryption module, information transmission module, information decompression module and the data module of looking over that includes of block chain network, wherein:
a history transmission module: the module comprises a data identification unit and a quick transmission channel inside, can search in the network terminal, directly search historical network connection transmission objects and target network areas, and can skip a fussy verification process in the middle and directly transmit the objects to the other terminal if the target transmission objects generate historical transmission records with the target transmission objects;
a compression encryption module: the module can automatically encrypt and compress data to be transmitted and other related information, after encryption and compression, the module can mark the outside of the file or the information to avoid interception in the transmission process, and the mark code is related to a transmitted target domain name and a user name;
the information transmission module: the module can accurately position a file or information transmission area, and quickly transmit the file or information to reduce the transmission rate;
the information decompression module: the module can identify the mark code, if the current domain name or user name is consistent with the mark of the mark code, the file or information can be quickly unlocked, if the current domain name or user name is intercepted, the mark code cannot be identified, and the file or information can be encrypted all the time;
a data viewing module: the module can quickly restore the encrypted file or information, and the normal watching effect of the encrypted file or information is ensured in the network terminal with the passive permission.
Preferably, the main authority internally comprises a first login authentication module, a first transmission end authentication module and a first object receiving authentication module, wherein the output end of the first login authentication module is connected with the input end of the first transmission end authentication module, and the output end of the first transmission end authentication module is connected with the input end of the first object receiving authentication module.
Preferably, the receiving object verification internally comprises common network area verification, transmission security verification and receiving network security verification, and the network area verification, the transmission security verification and the receiving network security verification are performed synchronously.
Preferably, the passive authority internally comprises a login authentication module II, a receiving end authentication and a transmission object authentication, wherein the output end of the login authentication module II is connected with the input end of the receiving end authentication, and the output end of the receiving end authentication is connected with the input end of the transmission object authentication.
Preferably, the inside of the transmission object authentication includes a file security authentication for detecting a file and a virus or other malignant program possibly carried in the information, and a transmission network security authentication for detecting network environment security of the transmission.
Preferably, the network terminal requires a user to apply for permission for transmission and reception during transmission, the permission application includes login or registration of personal information, and the network terminal may include a plurality of mobile terminals and calculators with different specifications.
Preferably, the output end of the history transmission module is connected with the input end of the data viewing module, and the login modes of the login verification module I and the login verification module II are short message, password or fingerprint verification.
Compared with the prior art, the invention has the beneficial effects that: this network security connected system based on block chain, at first this system has two kinds of authority modes, both can only change, can not exist simultaneously, like this in the use, just can avoid appearing omitting the file, file and information are sent by mistake, or file information is too much, influence the problem of network security, and in the use, block chain network inside has multiple module, can be fine encrypt file and information, only can untie under specific circumstances, help file and information that so not only can be accurate transmit, increase the accuracy of butt joint, and simultaneously, can also improve the security of information, fine avoided under the traditional condition file in the transmission course hijack and the problem of revealing, fine help has increased network security.
Thirdly, the network security connection system based on the block chain can store the receiving address or the user name of historical transmission in a historical transmission mode, can directly skip the middle security detection step when transmitting next time, and enters the data checking module, so that the transmission security of the file can be increased more quickly and safely, and the practicability of the system can be further improved.
Drawings
FIG. 1 is a schematic diagram of the system of the present invention;
FIG. 2 is a diagram illustrating the inside of the master authority according to the present invention;
FIG. 3 is an internal diagram of passive authorization according to the present invention;
FIG. 4 is a diagram illustrating an internal structure of a history transmission module according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-4, the present invention provides a technical solution: a network security connection system based on a block chain comprises a network terminal, a main authority, a passive authority and a block chain network, wherein the main authority and the passive authority are in a running relation with the network terminal, the output end of the main authority is connected with the input end of the block chain network, and the output end of the block chain network is connected with the input end of the passive authority;
inside history transmission module, compression encryption module, information transmission module, information decompression module and the data of including of block chain network looks up the module, wherein:
a history transmission module: the module comprises a data identification unit and a quick transmission channel inside, can search in the network terminal, directly search historical network connection transmission objects and target network areas, and can skip a fussy verification process in the middle and directly transmit the objects to the other terminal if the target transmission objects generate historical transmission records with the target transmission objects;
a compression encryption module: the module can automatically encrypt and compress data to be transmitted and other related information, after encryption and compression, the module can mark the outside of the file or the information to avoid interception in the transmission process, and the mark code is related to a transmitted target domain name and a user name;
the information transmission module: the module can accurately position a file or information transmission area, and quickly transmit the file or information to reduce the transmission rate;
the information decompression module: the module can identify the mark code, if the current domain name or user name is consistent with the mark of the mark code, the file or information can be quickly unlocked, if the current domain name or user name is intercepted, the mark code cannot be identified, and the file or information can be encrypted all the time;
a data viewing module: the module can quickly restore the encrypted file or information, and the normal watching effect of the encrypted file or information is ensured in the network terminal with the passive permission.
In the invention: the main authority comprises a first login authentication module, a transmission terminal authentication module and a received object authentication module, wherein the output end of the first login authentication module is connected with the input end of the transmission terminal authentication module, and the output end of the transmission terminal authentication module is connected with the input end of the received object authentication module.
In the invention: the receiving object verification internally comprises common network area verification, transmission safety verification and receiving network safety verification, and the network area verification, the transmission safety verification and the receiving network safety verification are carried out synchronously.
In the invention: the passive authority internally comprises a second login authentication module, a second receiving end authentication module and a second transmission object authentication module, wherein the output end of the second login authentication module is connected with the input end of the second receiving end authentication module, and the output end of the second receiving end authentication module is connected with the input end of the second transmission object authentication module.
In the invention: the transmission object verification internally comprises file security verification and transmission network security verification, wherein the file security verification is used for detecting files and viruses or other malignant programs possibly carried in information, and the transmission network security verification is used for detecting the security of a network environment for transmission.
In the invention: the network terminal requires a user to apply for authority for transmission and reception in the transmission process, the authority application comprises login or registration of personal information, and the network terminal can comprise mobile terminals, calculators and the like with various specifications.
In the invention: the output end of the history transmission module is connected with the input end of the data checking module, and the login modes of the login verification module I and the login verification module II are short message, password or fingerprint verification.
The working principle is as follows: before the system is used, a block chain network is required to be built in various network terminals, and meanwhile, the network terminals comprise various mobile terminals and computers, so that the system can be registered and logged in, and the main authority and the passive authority are distinguished according to the transmission mode of the system for files and information.
In the using process of the invention, the block chain-based network security connection system applies for the main authority if the transmission of the files and the information is required, the system can detect the network security of the receiving end after logging in, the files and the information are compressed and encrypted through the block chain network, the mark codes corresponding to the characteristics of the receiving end are extracted from the files and the information, the information and the files are transmitted and directly transmitted to the account of the opposite side, the opposite side can decompress the files and the information by utilizing the correct characteristics of the receiving end and then convert the compressed codes into normal characters to help reading, at the moment, the personnel reading the information also needs to log in at the passive authority to receive the files and the information from the transmitting end, and can perform secondary detection on the security of the files, thereby ensuring the normal use of the system, if the transmission objects of the files and the information originally have transmission history, the intermediate security detection part can be directly skipped over, and the file can be rapidly and directly transmitted, so that the efficiency of checking and transmitting can be improved.
In summary, the following steps: this network security connected system based on block chain, at first this system has two kinds of authority modes, both can only change, can not exist simultaneously, like this in the use, just can avoid appearing omitting the file, file and information are sent by mistake, or file information is too much, influence the problem of network security, and in the use, block chain network inside has multiple module, can be fine encrypt file and information, only can untie under specific circumstances, help file and information that so not only can be accurate transmit, increase the accuracy of butt joint, and simultaneously, can also improve the security of information, fine avoided under the traditional condition file in the transmission course hijack and the problem of revealing, fine help has increased network security.
Thirdly, the network security connection system based on the block chain can store the receiving address or the user name of historical transmission in a historical transmission mode, can directly skip the middle security detection step when transmitting next time, and enters the data checking module, so that the transmission security of the file can be increased more quickly and safely, and the practicability of the system can be further improved.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
The related modules involved in the system are all hardware system modules or functional modules combining computer software programs or protocols with hardware in the prior art, and the computer software programs or the protocols involved in the functional modules are all known in the technology of persons skilled in the art, and are not improvements of the system; the improvement of the system is the interaction relation or the connection relation among all the modules, namely the integral structure of the system is improved, so as to solve the corresponding technical problems to be solved by the system.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (7)

1. The utility model provides a network security connected system based on block chain, includes network terminal, owner's permission, passive permission and block chain network, its characterized in that: the master authority and the passive authority are in a running relation with the network terminal, the output end of the master authority is connected with the input end of the block chain network, and the output end of the block chain network is connected with the input end of the passive authority;
the inside historical transmission module, compression encryption module, information transmission module, information decompression module and the data module of looking over that includes of block chain network, wherein:
a history transmission module: the module comprises a data identification unit and a quick transmission channel inside, can search in the network terminal, directly search historical network connection transmission objects and target network areas, and can skip a fussy verification process in the middle and directly transmit the objects to the other terminal if the target transmission objects generate historical transmission records with the target transmission objects;
a compression encryption module: the module can automatically encrypt and compress data to be transmitted and other related information, after encryption and compression, the module can mark the outside of the file or the information to avoid interception in the transmission process, and the mark code is related to a transmitted target domain name and a user name;
the information transmission module: the module can accurately position a file or information transmission area, and quickly transmit the file or information to reduce the transmission rate;
the information decompression module: the module can identify the mark code, if the current domain name or user name is consistent with the mark of the mark code, the file or information can be quickly unlocked, if the current domain name or user name is intercepted, the mark code cannot be identified, and the file or information can be encrypted all the time;
a data viewing module: the module can quickly restore the encrypted file or information, and the normal watching effect of the encrypted file or information is ensured in the network terminal with the passive permission.
2. The system according to claim 1, wherein the system comprises: the main authority comprises a first login authentication module, a transmission terminal authentication module and a received object authentication module, wherein the output end of the first login authentication module is connected with the input end of the transmission terminal authentication module, and the output end of the transmission terminal authentication module is connected with the input end of the received object authentication module.
3. The system according to claim 2, wherein the system comprises: the receiving object verification internally comprises common network area verification, transmission safety verification and receiving network safety verification, and the network area verification, the transmission safety verification and the receiving network safety verification are carried out synchronously.
4. The system according to claim 1, wherein the system comprises: the passive authority comprises a second login authentication module, a second receiving end authentication module and a second transmission object authentication module, wherein the output end of the second login authentication module is connected with the input end of the second receiving end authentication module, and the output end of the second receiving end authentication module is connected with the input end of the second transmission object authentication module.
5. The system according to claim 4, wherein the inside of the transmission object authentication includes a file security authentication for detecting a file and a virus or other malignant program possibly carried in the information, and a transmission network security authentication for detecting network environment security of the transmission.
6. The system according to claim 1, wherein the system comprises: the network terminal requires a user to apply for permission for transmission and reception in the transmission process, the permission application comprises login or registration of personal information, and the network terminal can comprise mobile terminals, calculators and the like with various specifications.
7. The system according to claim 1, wherein the system comprises: the output end of the history transmission module is connected with the input end of the data checking module, and the login modes of the login verification module I and the login verification module II are short message, password or fingerprint verification.
CN202010502275.0A 2020-06-04 2020-06-04 Block chain-based network security connection system Pending CN111711619A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010502275.0A CN111711619A (en) 2020-06-04 2020-06-04 Block chain-based network security connection system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010502275.0A CN111711619A (en) 2020-06-04 2020-06-04 Block chain-based network security connection system

Publications (1)

Publication Number Publication Date
CN111711619A true CN111711619A (en) 2020-09-25

Family

ID=72538854

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010502275.0A Pending CN111711619A (en) 2020-06-04 2020-06-04 Block chain-based network security connection system

Country Status (1)

Country Link
CN (1) CN111711619A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103166958A (en) * 2013-02-26 2013-06-19 深圳创维数字技术股份有限公司 Protection method and protection system of file
WO2018032373A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Security network attachment device and method for block chain
CN108449336A (en) * 2018-03-16 2018-08-24 浙江创邻科技有限公司 Data traceability based on block chain and strong encryption method, apparatus, medium and system
CN108566395A (en) * 2018-04-20 2018-09-21 济南浪潮高新科技投资发展有限公司 A kind of document transmission method, apparatus and system based on block chain
WO2020008367A1 (en) * 2018-07-02 2020-01-09 Bitchange Oü A method of creating a digital id or digital data storage of a person or an organization, and a method of using the digital id or digital data storage for remote identification
CN110799941A (en) * 2017-06-30 2020-02-14 微软技术许可有限责任公司 Data protection against theft and tampering
CN111224971A (en) * 2019-12-31 2020-06-02 陕西医链区块链集团有限公司 Block chain data encryption and decryption method and encryption and decryption system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103166958A (en) * 2013-02-26 2013-06-19 深圳创维数字技术股份有限公司 Protection method and protection system of file
WO2018032373A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Security network attachment device and method for block chain
CN110799941A (en) * 2017-06-30 2020-02-14 微软技术许可有限责任公司 Data protection against theft and tampering
CN108449336A (en) * 2018-03-16 2018-08-24 浙江创邻科技有限公司 Data traceability based on block chain and strong encryption method, apparatus, medium and system
CN108566395A (en) * 2018-04-20 2018-09-21 济南浪潮高新科技投资发展有限公司 A kind of document transmission method, apparatus and system based on block chain
WO2020008367A1 (en) * 2018-07-02 2020-01-09 Bitchange Oü A method of creating a digital id or digital data storage of a person or an organization, and a method of using the digital id or digital data storage for remote identification
CN111224971A (en) * 2019-12-31 2020-06-02 陕西医链区块链集团有限公司 Block chain data encryption and decryption method and encryption and decryption system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
宋明秋等: "基于攻击传播性的分布式网络信任模型", 《运筹与管理》 *

Similar Documents

Publication Publication Date Title
Rizvi et al. Securing the internet of things (IoT): A security taxonomy for IoT
CN104469767B (en) The implementation method of integrated form security protection subsystem in a set of mobile office system
CN105553940A (en) Safety protection method based on big data processing platform
CN112217835B (en) Message data processing method and device, server and terminal equipment
CN112597462A (en) Industrial network safety system
CN103780584A (en) Cloud computing-based identity authentication fusion method
Park et al. An enhanced smartphone security model based on information security management system (ISMS)
CN109726578B (en) Dynamic two-dimensional code anti-counterfeiting solution
CN112995227B (en) One-stop information service platform based on three-party credit management
CN109495482A (en) A kind of network data information safe transmission method
CN111711619A (en) Block chain-based network security connection system
CN106130996B (en) A kind of website attack protection verifying system and method
CN114553573A (en) Identity authentication method and device
Lei et al. Self-recovery Service Securing Edge Server in IoT Network against Ransomware Attack.
Kang et al. A study on the needs for enhancement of personal information protection in cloud computing security certification system
CN112000953A (en) Big data terminal safety protection system
Ming et al. Analysis of computer network information security and protection strategy
Sorge IT Security measures and their relation to data protection
Odokuma et al. Internet Threats and Mitigation Methods in Electronic Businesses Post Covid-19
Mishra et al. Cyber security in cloud platforms
CN111932751B (en) Intelligent park Internet of things comprehensive management platform and management method
Fu et al. An Improved Biometric Fuzzy Signature with Timestamp of Blockchain Technology for Electrical Equipment Maintenance
EP4068125B1 (en) Method of monitoring and protecting access to an online service
Nadjar et al. A Case Study on the Multi-Vector Data Breach on Astoria
Guo et al. Research on risk analysis and security testing technology of mobile application in power system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200925

RJ01 Rejection of invention patent application after publication