CN113901523A - Trusted traceability method and system based on block chain and storage medium - Google Patents

Trusted traceability method and system based on block chain and storage medium Download PDF

Info

Publication number
CN113901523A
CN113901523A CN202111487590.1A CN202111487590A CN113901523A CN 113901523 A CN113901523 A CN 113901523A CN 202111487590 A CN202111487590 A CN 202111487590A CN 113901523 A CN113901523 A CN 113901523A
Authority
CN
China
Prior art keywords
data
security
privacy
safety
resource pool
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111487590.1A
Other languages
Chinese (zh)
Other versions
CN113901523B (en
Inventor
董陵
童恩
赵挺
孙迎春
杨鹏
金灿
朱艳杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Mobile Information System Integration Co ltd
Original Assignee
Jiangsu Mobile Information System Integration Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Mobile Information System Integration Co ltd filed Critical Jiangsu Mobile Information System Integration Co ltd
Priority to CN202111487590.1A priority Critical patent/CN113901523B/en
Publication of CN113901523A publication Critical patent/CN113901523A/en
Application granted granted Critical
Publication of CN113901523B publication Critical patent/CN113901523B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computing Systems (AREA)
  • Medical Informatics (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a block chain-based trusted traceability method and system and a storage medium, and belongs to the field of safe data and safe result open use. Establishing an initial database, wherein the initial database is open, the safety capability type and the safety capability of the initial database can be dynamically expanded, a safety information chain is established in a local area network, data chain linking, process chain linking and capability chain linking are carried out on source data stored in the initial database, a privacy model is established, privacy calculation is carried out on chain linked data, the safety data after the privacy calculation is credibly open, the safety data are expanded, and the safety data are upgraded into a safety capability resource pool. The invention further enriches the safety data, process and capability of chaining, constructs the tenant defense union in the open pan-LAN, realizes the sharing of the safety protection result of the safety resource pool client in the LAN, and is suitable for the multi-target client group security field of government, enterprises and the like.

Description

Trusted traceability method and system based on block chain and storage medium
Technical Field
The invention belongs to the field of H04L digital information transmission, particularly relates to the field of safe data and safe result open use, and particularly relates to a block chain-based trusted traceability method and system and a storage medium.
Background
With the continuous development of scientific technology, the attack means of network security and data security is continuously promoted, and the traditional network space security protection system and data security protection tool are mainly static and cannot realize effective linkage among all parts, so that a defending union cannot be effectively formed. Meanwhile, a network attacker forms an attack surface with a certain scale, and achieves certain consensus on the aspect of attack data while sharing tools and technologies, so that a passive situation that a defender faces from point to point is created.
For example, the data of the target client has a single property, that is, the target client has certain security when used, and when the client is authorized to use, the source data of the target client is easily divulged due to factors such as a network address change and a firewall, and the security of the source data is protected when the data is shared, so that the target client dares not to easily open the source data, and the information sharing cannot be realized.
Therefore, under the situation that the current network attacker attacks the point, the defender needs to continuously improve the security protection capability of the network by means of stacking devices, reinforcing boundaries and the like, and worry about leakage of data such as network information and data information of the defender and failure in effective opening of the suffered attack information.
Disclosure of Invention
The invention provides a credible tracing method and system based on a block chain and a storage medium for solving the technical problems in the background technology.
The invention adopts the following technical scheme: the trusted traceability method based on the block chain comprises the following steps:
establishing an open initial database; the initial database is used for recording source data of a target client;
establishing a safety information chain in a local area network, authorizing source data by a user to obtain corresponding authorized source data, and performing data uplink on the authorized source data;
a privacy calculation model is built, privacy calculation is carried out on authorization source data in the safety information chain, privacy result data are obtained, and the privacy calculation process and the data are stored in the safety information chain;
and synchronizing the privacy result data to an initial database, and upgrading the initial database to a security capability resource pool which is opened to the privacy result data in a credible manner.
According to the technical scheme, an initial database is established at first, source data of a target client are stored, the initial database is open, the target client is allowed to enter and check related information, a safety information chain is established based on a block chain, data chaining, process chaining and capability chaining are carried out, safety data on the chain are managed uniformly, safety data privacy calculation is carried out, a safety capability resource pool is established, and a privacy calculation result based on the block chain is credibly open, so that the problem of security sharing of a defender is solved.
In a further embodiment, the pool of security capability resources includes at least content security, network security, and data security; wherein the content security at least comprises text detection, image detection, voice detection, video detection and website detection;
the network security includes at least: flow cleaning, host vulnerability scanning, web vulnerability scanning, video security private network, network security monitoring and network security protection;
the data security includes at least: data sensitive discovery, data desensitization, APP vulnerability detection, identity authentication service, log audit service and database audit service.
By the technical scheme, based on the initial database, text detection, image detection, voice detection, video detection and website detection are optimized, the safety capability type and the safety capability of the subsequently upgraded safety capability resource pool can be expanded, other contents can be further added, and the subsequent upgrade iteration is suitable for the source data in the initial database.
In a further embodiment, the privacy computation model is an improved ITTO privacy computation model.
Through the technical scheme, the ITTO privacy calculation model, namely Input, Tools & Technique and Output, is upgraded and introduced, and privacy calculation is carried out on the source data in the safety information chain.
In a further embodiment, a method of constructing the privacy computation model comprises the steps of:
step one, in a safety information chain, carrying out privacy calculation on authorization source data to obtain corresponding result data; carrying out simulation replacement on the result data to obtain initial replacement data;
secondly, carrying out privacy calculation on the initial replacement data to obtain updated result data; carrying out simulation replacement on the updated result data to obtain updated replacement data;
and step three, taking the updated replacement data as the initial replacement data of the next step, and repeating the step two until the authorization source data is desensitized to obtain the final privacy result data.
According to the technical scheme, firstly, the first privacy calculation is carried out on the source data M in the safety information chain to obtain the data M1For data M1Carrying out simulation replacement to obtain data M11(ii) a For data M11Performing a second privacy calculation to obtain data M2(ii) a For data M2Carrying out simulation replacement to obtain data M21(ii) a And circulating the calculation until the source data of the target client is desensitized, sharing the data subjected to privacy calculation to the authorized client B and the authorized client C by the target client A, and sharing the data subjected to privacy calculation to the authorized client B and the authorized client C by the authorized client C to finally realize that the defense quality of N times of the source data is improved, namely the original 1 part of information/data and the current N parts of information/data are obtained.
In a further embodiment, the core capabilities of the privacy computation model are data decay and value conservation; the privacy computing model follows the principle of applicable information minimization openness.
Through the technical scheme, the security resource pool chain supports sustainable iterative evolution, supports the change of uplink data, processes and capabilities, and has the broadcast notification capability after uplink information change, wherein the initial database is upgraded to the security capability resource pool, so that the data on the security information chain and the data in the security capability resource pool are synchronized, the security capability type and the security capability of the security capability resource pool can be expanded, the subsequent upgrade and sustainable iterative evolution of the security information block chain are suitable for the change of the previous uplink data, processes and capabilities, and the calculated new data is synchronously updated to the security capability resource pool.
In a further embodiment, the content of the security capability resource pool which is opened trustinely comprises at least:
the target client is used for acquiring the source data in the security capability resource pool according to the private key; and the target client and the authorized client acquire the data subjected to privacy calculation in the security capability resource pool according to the public key.
Through the technical scheme, the method and the device are used for realizing the sharing of the information in the security capability resource pool and accelerating the construction of the information sharing alliance.
In a further embodiment, further comprising:
further improving data, processes and capabilities on the secure information chain;
further augmenting authorized source data within the security capability resource pool;
and constructing a tenant defense union in the open universal local area network, and realizing the sharing of the client security protection results of the security resource pool in the local area network.
According to the technical scheme, based on the safety capacity resource pool, the content of the source data in the resource pool is expanded, meanwhile, the data, the process and the capacity of the safety information chain are further upgraded, the source data authorized by a target client are expanded, the safety capacity resource pool in the universal local area network is constructed, and information sharing is further achieved.
In a further embodiment, a computer system comprises a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method as described above when executing the computer program.
In a further embodiment, a computer-readable storage medium has stored thereon a computer program which, when being executed by a processor, carries out the steps of the method as described above.
The invention has the beneficial effects that: according to the invention, a trusted traceability method based on a block chain is provided, and a local defense union is constructed on the premise of authorization of a target client; desensitizes source data of a target client, hides and replaces sensitive data of the target client, finally shares security data for authorized clients, opens attacks received by the authorized clients to be used by other clients in a local defense alliance, uses the security data of the authorized clients and the security data of the other clients, strengthens data security in a security resource pool, namely breaks a data island in a security protection process by using a block chain and technical trust of privacy calculation, and improves the overall defense quality and efficiency of the target client in the security resource pool.
Drawings
Fig. 1 is a flow chart of a pool block chain construction & safe resource uplink.
FIG. 2 is a flow diagram of a security outcome privacy computation model construction.
Fig. 3 is a flow chart of secure data privacy computation & trusted opening of a target client.
Detailed Description
Based on the problems of security information protection and the like mentioned in the background, the invention constructs a security capability resource pool and a security information chain simultaneously based on the block chain, namely, a block chain technology is utilized to enable the data after the source data is subjected to privacy calculation, the calculation process and the corresponding data can be traced, all the data are kept in the security capability resource pool in the local area network, the privacy calculation is carried out on the authorized data, the data is desensitized, and the diversity of the source data is enhanced, so that the single source data is protected from point to line and is upgraded into line protection, the authorized source data is further increased, the capability of the security information chain is synchronously upgraded, the source data in the security capability resource pool is further upgraded into surface protection from line protection, the information sharing in the security capability resource pool is further realized, and the data in the security capability resource pool is effectively opened.
The trusted traceability method based on the block chain in the embodiment is shown in fig. 1 and comprises the following steps of establishing an open initial database; the initial database is used for recording source data of a target client; step two, a safety information chain is established in the local area network, partial users authorize the source data of the users to obtain corresponding authorized source data, and step four, data chaining is carried out on the authorized source data; thirdly, a privacy calculation model is established, privacy calculation is carried out on the authorization source data in the safety information chain, privacy result data are obtained, and the privacy calculation process and the data are stored in the safety information chain; step four, synchronizing privacy result data into an initial database, upgrading the initial database into a security capacity resource pool, and opening the security data after privacy calculation in a credible manner by the security capacity resource pool, namely passing through three core modules: 1. data uplink, process uplink, capability uplink; 2. uniformly managing security data, and carrying out security data privacy calculation; 3. the block chain-based privacy calculation result is credibly opened, so that the problem of safe sharing of the defenders is solved, the defender defending quality and efficiency are greatly improved, and an initial database are firstly established. Firstly, establishing an initial database, storing source data of a target client, wherein the initial database is open and allows the target client to enter and view related information, the source data preferably selects three safety information units, namely content safety, network safety and data safety, and the content safety at least comprises text detection, image detection, voice detection, video detection and website detection; the network security at least comprises: flow cleaning, host vulnerability scanning, web vulnerability scanning, video security private network, network security monitoring and network security protection; the data security at least comprises: data sensitive discovery, data desensitization, APP vulnerability detection, identity authentication service, log audit service and database audit service. The security capability type and security capability of the initial database can be dynamically expanded, and other contents can be further added.
Based on the technical scheme, the initial database is a traditional database, the security mode of the traditional database is simple, under the situation that a current network attacker is attacking points, the traditional database is often used for improving the security protection capability of the traditional database by means of stacking equipment, reinforcing boundaries and the like, and the difficulty of network security maintenance is increased undoubtedly. For example, client a is attacked by an address of M country, client a itself has made firewall reinforcement, but client B and client C authorized by a do not know this attack information, do not make firewall reinforcement, and do not follow the current situation, client B and client C also have risks of being attacked and affected by M, but if client B and client C obtain shared data of a, and the shared data is actually made firewall reinforcement, it is possible to realize timely and effective defense, that is, the target client a uses private key, corresponding source data (making client a's private key unique), authorized client B, C uses public key, corresponding to data processed by security information chain, to add multiple expression forms of target client a's source data, thereby protecting client a's source data's security information, and at the same time, opening a's privacy result data to authorized client B, And C, finishing data sharing, namely, the tenant A in the figure 3 shares the data to the tenant B and the tenant C, namely, the target client acquires the source data in the safety capacity resource pool according to the private key, and the target client and the authorized client acquire the result data in the safety capacity resource pool according to the public key.
Based on the technical scheme, after authorized source data are linked, privacy processing needs to be performed on the source data in a security information chain, so that the source data of a target client derive privacy result data, the differentiation of the privacy result data is increased, and effective information of the source data is difficult to obtain due to illegal attacks Carrying out privacy calculation according to network security and security to obtain privacy result data, wherein the content security comprises at least detection, image detection, voice detection, video detection and website detection; the network security at least comprises: flow cleaning, host vulnerability scanning, web vulnerability scanning, video security private network, network security monitoring and network security protection; data security is at least: data sensitivity discovery, data desensitization, APP vulnerability detection, identity authentication service, log audit service and database audit service, and finally, the privacy calculation process and record are recorded in a safety information chain, and privacy result data are synchronously sent to an initial database, so that the initial database is further upgraded into a safety capacity resource pool.
Based on the above technical solution, referring to fig. 2, an ITTO (i.e. Output to (Input) and Output result (Output) obtained by Tools (Tools) and techniques (Technique)) privacy computation model is used to desensitize source data authorized by a target client in a security capability resource pool, that is, source data stored in a security information chain, and in a further embodiment, the privacy computation content at least includes: performing tenant identity information privacy calculation, tenant network information privacy calculation, tenant service information privacy calculation and capability differentiation result privacy calculation, and performing circular calculation and simulation replacement on the four contents, wherein the privacy calculation method model comprises the following steps: firstly, carrying out first privacy calculation on authorized source data in a security information chain to obtain first result data; step two, carrying out simulation replacement on the first result data to obtain first replacement data; step three, firstPerforming privacy calculation on the secondary replacement data for the second time, performing simulation replacement, performing calculation and replacement for multiple times, desensitizing authorized source data to obtain privacy result data, namely performing privacy calculation on the source data M in the safety information chain for the first time to obtain the result data M for the first time1For the first time result data M1Carrying out simulation replacement to obtain first replacement data M11(ii) a For the first time replacement data M11Carrying out the second privacy calculation to obtain the second result data M2(ii) a For the second time result data M2Carrying out simulation replacement to obtain second replacement data M21(ii) a The above calculation is circulated until the source data is desensitized to obtain final security data [ M ], for example, the specific website information part included in the content security, a tenant website www.busjs.com of an enterprise in Jiangsu province, picture information at the lower left corner of the top page of the tenant is tampered, the picture information is a sensitive person, and first, the original data collected and received by the security information chain are: name of tenth 0212, dest of www.busjs.com, loc of left-down-pic21, type of pic, cont of sensitive person and risk of 2;
a first step of privacy calculation, namely, a result after the tenant identity information privacy calculation: 202110040101 name, www.busjs.com dest, loc left-down-pic21 type pic, cont sensitive person and risk 2; and (3) the result after the tenant network information privacy calculation is as follows: 202110040101 name, www.202110040102.com dest, left-down-pic21 type pic, cont sensitive person and risk 2; and (3) the result after the tenant service information privacy calculation: 202110040101 name, www.202110040102.com dest, left-down, 2 type, cont sensitive person and risk 2;
and a second step of privacy calculation, namely, the result after the capability differentiation privacy calculation: 2, dest, website/host class, cont, sensitive person and del, wherein the steps are full-network retrieval/resource library deep retrieval;
the core information of the finally output data after privacy calculation comprises a risk level, a target type, risk content and a risk handling method, namely the value of the finally output data is opened to all other tenants in a local area network, and meanwhile, the risk of exposing the information of the user is avoided, wherein after content security, network security and data security are calculated, content security after privacy calculation is respectively obtained, and the content security comprises attack IP, an attack protocol, violation content forms and the like; network security after privacy calculation comprises attack IP, attack time, attack position, attack influence and the like; the data security after privacy calculation comprises risk types, residence time, transverse movement risk and the like, and the final privacy result data is stored in a security information chain, namely, the target client acquires the source data M according to a private key; and the authorized client B, the authorized client C or the authorized client D acquires the source data (M) according to the public key.
Based on the technical scheme, in order to construct a security capability resource pool, namely, further upgrade the initial database based on the security information chain, in a further embodiment, data, processes and capabilities on the security information chain are further improved; further augmenting authorized source data within the security capability resource pool; the tenant defense alliance in the open type universal local area network is built, the customer security protection achievement sharing of the security resource pool in the local area network is achieved, namely privacy result data on a security information chain are synchronized to an initial database, the security information chain supports continuous iterative evolution, supports the change of uplink data, processes and capabilities, and has the broadcast notification capability after uplink information change, namely the security capability type and the security capability of the security capability resource pool can be dynamically expanded, the subsequent upgrading and the continuous iterative evolution of the security information chain are suitable for the change of the previous uplink data, processes and capabilities, and the calculated new data are synchronously updated to the security capability resource pool.

Claims (9)

1. The trusted traceability method based on the block chain is characterized by comprising the following steps:
establishing an open initial database; the initial database is used for recording source data of a target client;
establishing a safety information chain in a local area network, authorizing source data by a user to obtain corresponding authorized source data, and performing data uplink on the authorized source data;
a privacy calculation model is built, privacy calculation is carried out on authorization source data in the safety information chain, privacy result data are obtained, and the privacy calculation process and the data are stored in the safety information chain;
and synchronizing the privacy result data to an initial database, and upgrading the initial database to a security capability resource pool which is opened to the privacy result data in a credible manner.
2. The block chain based trusted traceability method of claim 1, wherein the security capability resource pool comprises at least content security, network security and data security; wherein the content security at least comprises text detection, image detection, voice detection, video detection and website detection;
the network security includes at least: flow cleaning, host vulnerability scanning, web vulnerability scanning, video security private network, network security monitoring and network security protection;
the data security includes at least: data sensitive discovery, data desensitization, APP vulnerability detection, identity authentication service, log audit service and database audit service.
3. The block chain based trusted traceability method of claim 1, wherein the privacy computation model is an improved ITTO privacy computation model.
4. The block chain based trusted traceability method according to claim 3, wherein the method for constructing the privacy computation model comprises the following steps:
step one, in a safety information chain, carrying out privacy calculation on authorization source data to obtain corresponding result data; carrying out simulation replacement on the result data to obtain initial replacement data;
secondly, carrying out privacy calculation on the initial replacement data to obtain updated result data; carrying out simulation replacement on the updated result data to obtain updated replacement data;
and step three, taking the updated replacement data as the initial replacement data of the next step, and repeating the step two until the authorization source data is desensitized to obtain the final privacy result data.
5. The block chain based trusted traceability method of claim 1, wherein the core capability of the privacy computation model is data attenuation and value conservation; the privacy computing model follows the principle of applicable information minimization openness.
6. The block chain-based trusted traceability method of claim 1, wherein the contents of the security capability resource pool trusted and opened at least comprise:
the target client is used for acquiring the source data in the security capability resource pool according to the private key; and the target client and the authorized client are used for acquiring result data in the safety capacity resource pool according to the public key.
7. The block chain based trusted traceability method of claim 1, further comprising:
further improving data, processes and capabilities on the secure information chain;
further augmenting authorized source data within the security capability resource pool;
and constructing a tenant defense union in the open universal local area network, and realizing the sharing of the client security protection results of the security resource pool in the local area network.
8. A computer system comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method according to any of claims 1 to 7 are implemented by the processor when executing the computer program.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN202111487590.1A 2021-12-08 2021-12-08 Trusted traceability method and system based on block chain and storage medium Active CN113901523B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111487590.1A CN113901523B (en) 2021-12-08 2021-12-08 Trusted traceability method and system based on block chain and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111487590.1A CN113901523B (en) 2021-12-08 2021-12-08 Trusted traceability method and system based on block chain and storage medium

Publications (2)

Publication Number Publication Date
CN113901523A true CN113901523A (en) 2022-01-07
CN113901523B CN113901523B (en) 2022-04-15

Family

ID=79025515

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111487590.1A Active CN113901523B (en) 2021-12-08 2021-12-08 Trusted traceability method and system based on block chain and storage medium

Country Status (1)

Country Link
CN (1) CN113901523B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115550902A (en) * 2022-10-31 2022-12-30 中国联合网络通信集团有限公司 Security data updating method, USIM, terminal, device and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109547500A (en) * 2019-01-21 2019-03-29 信雅达系统工程股份有限公司 A kind of data sharing method and system for protecting user data ownership
CN111683071A (en) * 2020-05-29 2020-09-18 百度在线网络技术(北京)有限公司 Private data processing method, device, equipment and storage medium of block chain
CN111881487A (en) * 2020-08-07 2020-11-03 北京静宁数据科技有限公司 Data application system and data application method based on block chain
CN113434269A (en) * 2021-06-10 2021-09-24 湖南天河国云科技有限公司 Block chain-based distributed privacy calculation method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109547500A (en) * 2019-01-21 2019-03-29 信雅达系统工程股份有限公司 A kind of data sharing method and system for protecting user data ownership
CN111683071A (en) * 2020-05-29 2020-09-18 百度在线网络技术(北京)有限公司 Private data processing method, device, equipment and storage medium of block chain
CN111881487A (en) * 2020-08-07 2020-11-03 北京静宁数据科技有限公司 Data application system and data application method based on block chain
CN113434269A (en) * 2021-06-10 2021-09-24 湖南天河国云科技有限公司 Block chain-based distributed privacy calculation method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115550902A (en) * 2022-10-31 2022-12-30 中国联合网络通信集团有限公司 Security data updating method, USIM, terminal, device and medium
CN115550902B (en) * 2022-10-31 2024-03-19 中国联合网络通信集团有限公司 Security data updating method, USIM, terminal, equipment and medium

Also Published As

Publication number Publication date
CN113901523B (en) 2022-04-15

Similar Documents

Publication Publication Date Title
Wazid et al. Uniting cyber security and machine learning: Advantages, challenges and future research
US11196746B2 (en) Whitelisting of trusted accessors to restricted web pages
Rawat et al. iShare: Blockchain-based privacy-aware multi-agent information sharing games for cybersecurity
Yu et al. Security and privacy in the age of the smart internet of things: An overview from a networking perspective
Safavi et al. Cyber vulnerabilities on smart healthcare, review and solutions
Makkar et al. Secureiiot environment: Federated learning empowered approach for securing iiot from data breach
Eian et al. Cyber attacks in the era of covid-19 and possible solution domains
Rani et al. Cyber security techniques, architectures, and design
Adebayo et al. Blockchain-enabled information sharing framework for cybersecurity
CN113901523B (en) Trusted traceability method and system based on block chain and storage medium
Kloba et al. CYBER THREATS OF THE BANKING SECTOR IN THE CONDITIONS OF THE WAR IN UKRAINE.
Zamir Cybersecurity and social media
Mishra A Proficient Mechanism for Cloud Security Supervision in Distributive Computing Environment.
Wallich Wire pirates
Mumtaz et al. PDIS: A Service Layer for Privacy and Detecting Intrusions in Cloud Computing.
Maurushat et al. Artificial intelligence enabled cyber fraud: a detailed look into payment diversion fraud and ransomware
Memon et al. Analyzing distributed denial of service attacks in cloud computing towards the Pakistan information technol-ogy industry
Wei et al. Security vulnerability analysis of metaverse in cyberspace
Singh et al. A hybrid model for cyberspace security
CN109495455A (en) A kind of data processing system, method and apparatus
CN109522727A (en) A kind of data processing method, device and equipment
Zhang et al. Controlling Network Risk in E-commerce
Mercado Identifying the Advantages of Zero-Trust Architecture in the Cloud Environment
US20230188542A1 (en) Enhancing hybrid traditional neural networks with liquid neural network units for cyber security and offense protection
МОРОЗОВА et al. Smart home system security risk assessment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant