WO2021249335A1 - 应用于网络安全防御系统的输入输出系统 - Google Patents

应用于网络安全防御系统的输入输出系统 Download PDF

Info

Publication number
WO2021249335A1
WO2021249335A1 PCT/CN2021/098596 CN2021098596W WO2021249335A1 WO 2021249335 A1 WO2021249335 A1 WO 2021249335A1 CN 2021098596 W CN2021098596 W CN 2021098596W WO 2021249335 A1 WO2021249335 A1 WO 2021249335A1
Authority
WO
WIPO (PCT)
Prior art keywords
module
program
data
input
output
Prior art date
Application number
PCT/CN2021/098596
Other languages
English (en)
French (fr)
Inventor
贺磊
邬江兴
刘勤让
宋克
魏帅
沈剑良
谭立波
李彧
任权
周俊
傅敏
张伟丽
丁瑞浩
郭义伟
Original Assignee
国家数字交换系统工程技术研究中心
网络通信与安全紫金山实验室
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 国家数字交换系统工程技术研究中心, 网络通信与安全紫金山实验室 filed Critical 国家数字交换系统工程技术研究中心
Priority to US17/789,082 priority Critical patent/US20230039521A1/en
Publication of WO2021249335A1 publication Critical patent/WO2021249335A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0041Arrangements at the transmitter end
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0045Arrangements at the receiver end
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0061Error detection codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/08Arrangements for detecting or preventing errors in the information received by repeating transmission, e.g. Verdan system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0281Proxies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L2001/0092Error control systems characterised by the topology of the transmission link
    • H04L2001/0096Channel splitting in point-to-point links

Definitions

  • This application relates to the field of electronic information, and in particular to an input and output system applied to a network security defense system.
  • the various computers and information and communication equipment of the cyberspace information system can be regarded as a certain expression of the Turing machine, which can accept, store and run a program that can be described by the Turing machine. Realize the described algorithm, therefore, the cyberspace information system can be abstracted as a reconfigurable memory channel with processing capabilities.
  • the security of cyberspace information system is currently a research hotspot.
  • a network security defense system as shown in Figure 1.
  • a dynamic heterogeneous redundancy mechanism is used as one of the means of security defense.
  • the input and output of the system have the characteristics of single-point communication, and single-point communication cannot use dynamic heterogeneous redundancy mechanisms. Therefore, how to improve the safety of the output and output of the system shown in Figure 1 becomes Technical problems to be solved urgently.
  • This application provides an input and output system applied to a network security defense system, with the purpose of improving the security of input and output applied to the network security defense system.
  • An input and output system applied to a network security defense system including:
  • the structure coding unit is divided into: an input branching module and an input proxy module.
  • the input branching module is used for the copy and distribution of messages, and is verified to have no backdoor, and has an amnestic function. Used to eliminate the memory of the influence of generalized disturbance;
  • the error correction decoding unit is divided into: an output selection module, an output proxy module, an arbitration branch module, an arbitration proxy module, and a voting module;
  • the arbitration splitting module is used for data duplication and distribution; the voting module is used for voting; the output routing module is used for selecting from the processing results of the output proxy module according to the voting result of the voting module Output result;
  • the output routing module, the arbitration splitting module, and the voting module are verified to have no backdoor and have the amnestic function
  • At least the output proxy module and the arbitration proxy module use dynamic heterogeneous redundancy mechanism settings.
  • any one of the input splitting module, the output routing module, the arbitration splitting module, and the voting module is a target module
  • the target module includes:
  • Modules configured with redundancy and replacement mechanisms, and/or modules configured with non-random disturbance amnestics mechanisms;
  • the redundancy and replacement mechanism enables the target module to eliminate the memory of the influence of random disturbances
  • the non-random disturbing amnestics mechanism includes at least one of program solidification, program anti-tampering, data initialization, and data anti-tampering.
  • the program curing includes:
  • the program anti-tampering includes at least one of the following:
  • data initialization includes:
  • the data tamper resistance includes at least one of the following:
  • the data is verified or error corrected, and the data is initialized in response to the verification result indicating that the data is changed.
  • the input splitting module is configured to copy the received user request message into multiple copies, and distribute the multiple copies of the user request message to the input proxy module;
  • the input proxy module uses dynamic heterogeneous redundancy mechanism settings.
  • the input proxy module is configured to receive a user request message, and send the user request message to the input branching module;
  • the input splitting module is configured to copy the user request message into multiple copies, and distribute the multiple copies of the user request message to a service executive.
  • An input and output system applied to a network security defense system including:
  • the structure coding unit is divided into: an input branching module and an input proxy module.
  • the input branching module is used for the copy and distribution of messages, and is verified to have no backdoor, and has an amnestic function. Used to eliminate the memory of the influence of generalized disturbance;
  • the error correction decoding unit is divided into: a voting module, an output routing module, and an output proxy module;
  • the voting module is used for voting;
  • the output routing module is used for selecting an output result from the processing results of the output proxy module according to the voting result of the voting module;
  • the output routing module and voting module are verified to have no backdoor and have the amnestic function.
  • any one of the input splitting module, the output routing module, and the voting module is a target module
  • the target module includes:
  • Modules configured with redundancy and replacement mechanisms, and/or modules configured with non-random disturbance amnestics mechanisms;
  • the redundancy and replacement mechanism enables the target module to eliminate the memory of the influence of random disturbances
  • the non-random disturbing amnestics mechanism includes at least one of program solidification, program anti-tampering, data initialization, and data anti-tampering.
  • the program curing includes:
  • the program running in the target module is solidified so that the logic of the program cannot be changed, and/or the program running in the target module is solidified for the user, so that the user cannot change the logic of the program.
  • the program anti-tampering includes at least one of the following:
  • data initialization includes:
  • the data tamper resistance includes at least one of the following:
  • the data is verified or error corrected, and the data is initialized in response to the verification result indicating that the data is changed.
  • the input and output system applied to the network security defense system described in this application divides the structural coding unit and the error correction decoding unit.
  • the structural coding unit is divided into an input branching module and an input proxy module, and the error correction decoding unit is divided into an input branch module and an input proxy module. It is divided into output routing module, output proxy module, arbitration branch module, arbitration proxy module and voting module. Because the input splitting module is used for the copy and distribution of messages, the ruling splitting module is used for data copying and distribution, the voting module is used for voting, and the output selection module is used for outputting the proxy module based on the voting result of the voting module. The output result is selected in the processing result. It can be seen that the functions of the divided output selection module, the arbitration branch module and the voting module are simple.
  • the amnestic function of memory affected by disturbances and because the input proxy module, output proxy module, and the ruling proxy module can be set up using dynamic heterogeneous redundancy mechanisms to have security defense features, the input and output have higher safety.
  • Figure 1 is a schematic diagram of the structure of the security defense system
  • FIG. 2 is a schematic structural diagram of an input and output system applied to a network security defense system disclosed in an embodiment of the application;
  • FIG. 3 is a schematic structural diagram of another input and output system applied to a network security defense system disclosed in an embodiment of the application;
  • FIG. 4 is a schematic structural diagram of another input and output system applied to a network security defense system disclosed in an embodiment of the application.
  • Figure 1 is a security defense system proposed by the applicant, in which a dynamic heterogeneous redundancy mechanism is used to defend backdoors and loopholes caused by generalized disturbances.
  • the applicant found in the process of research that the input and output are single-point communication.
  • the input receives the request message input by the user, and the user usually only sends the request message once. Therefore, the input and output are not It is suitable for dynamic heterogeneous redundancy mechanism. Therefore, how to improve the safety of the input end and the output end has become an urgent problem to be solved in the system shown in FIG. 1.
  • the applicant considered the backdoors and loopholes caused by generalized disturbances. As long as the backdoors and loopholes can be eliminated, the security can be improved. Therefore, the applicant innovatively divides the functions of the input and output into basic functions (with the characteristics of single-point communication) and complex functions. Because the basic functions are simple, it can pass formal verification to ensure that there is no backdoor. In this case , As long as the loopholes caused by the basic function to the generalized disturbance can be eliminated, that is, the memory of the influence of the generalized disturbance can be eliminated, and the security defense of the basic function can be realized.
  • this application discloses an input and output system applied to a network security defense system to improve the security of the input end and the output end. It should be noted that although the input and output system disclosed in this application is designed with the system shown in Figure 1 as a starting point, it is not limited to the system shown in Figure 1. As long as there is an input and output system with security defense requirements, it can be used The input and output system disclosed in this case.
  • Figure 2 is an input and output system applied to a network security defense system disclosed in an embodiment of the application, including:
  • the structural coding unit is divided into: input branching module and input proxy module.
  • the error correction decoding unit is divided into: output routing module, output proxy module, arbitration branch module, arbitration proxy module, and voting module.
  • the structure coding unit and the error correction decoding unit are based on the division of the above structure, and the process of realizing the input and output functions is as follows:
  • the input splitting module is used to realize the function of copying and distributing messages.
  • the input splitting module is used to realize the function of copying and distributing messages.
  • an example of the copy and distribution function is: copy the received user request message into multiple copies, and distribute the multiple user request messages to the input agent module.
  • N input agents are used. Take for example.
  • the input proxy module is used to realize the functions of user communication connection termination, executive body connection initiation, and user service request message adaptation (fingerprint elimination, random transformation, etc.).
  • An example of function realization is: sending the received user request message to the service executive body.
  • function realization please refer to the prior art.
  • the output proxy module is used to realize the functions of user communication connection termination, executive connection initiation, and user service request message adaptation (fingerprint elimination, random transformation, etc.).
  • An example of function realization is: receiving an executive response message output by a service executive in response to a user request message, and outputting a normalized characteristic value (such as a hash value) to adapt the executive service response.
  • a normalized characteristic value such as a hash value
  • the arbitration branch module is used to realize the functions of data duplication and distribution. For example, the normalized feature value at the output of the output proxy module is copied into multiple copies and distributed to the ruling proxy module. For the specific method of function realization, please refer to the prior art.
  • the arbitration agency module is used to arbitrate the input data according to the preset arbitration algorithm and output the arbitration result. For example, a judgment is made on N normalized feature values, and the judgment result with the execution body number vector as the content is output. For the specific method of function realization, please refer to the prior art.
  • the voting module is used to realize the voting function. For example, for the input N execution body number vectors, the majority is selected bit by bit, and the output is 1 execution body number vector with every bit consistent. For the specific method of function realization, please refer to the prior art.
  • the output routing module is used to realize the function of selecting an output agent to respond to output from multiple output agent modules. For example, according to the executive body number vector indicated by the voting result, one executive body response message after output adaptation is randomly selected. For the specific method of function realization, please refer to the prior art.
  • the arbitration splitting module and the voting module can eliminate the memory of the influence of generalized disturbances, the safety requirements of the basic functions can be met.
  • the target module Any one of the input shunt module, output selection module, arbitration shunt module, and voting module is called the target module, and the memory elimination methods of the target module include the following:
  • the target module is the module configured with redundancy and replacement mechanism.
  • the redundancy and replacement mechanism refers to the use of redundant (for example, multiple) hardware and/or software, and after the reliability of one is reduced, the other is used to replace the reduced reliability of the hardware and/or software to improve reliability.
  • the input voting module in this embodiment is a plurality of voting units.
  • the voting unit is not affected by non-random disturbance, but because it has a lifetime, the reliability will be reduced. Therefore, two voting devices are used, one as the currently used device and the other as a redundant backup. In the case that the currently used voting device fails due to reduced reliability, the other is activated.
  • each proxy module (including input proxy module, output proxy module, and ruling proxy module) is also hardware (including processor and memory), on which various proxy modules are implemented.
  • the program of the function of the agent module is also hardware (including processor and memory), on which various proxy modules are implemented.
  • the target module is a module configured with a non-random perturbation amnesia mechanism.
  • the non-random disturbance amnestics mechanism includes at least one of program curing, program tamper-proofing, data initialization, and data tamper-proofing.
  • the program curing method includes: curing the program running in the target module so that the logic of the program cannot be changed, and/or curing the program running in the target module for the user so that the user cannot change the logic of the program.
  • the specific means of the curing procedure can be referred to the prior art.
  • Program anti-tampering includes at least one of the following:
  • the data initialization methods include:
  • Data tamper resistance includes at least one of the following:
  • non-random disturbance memory elimination mechanism can be implemented based on software and/or hardware.
  • each module used to implement basic functions in this embodiment has a security defense function.
  • the input proxy module, output proxy module, and adjudication proxy module in Figure 2 are set up with a dynamic heterogeneous redundancy mechanism to enable it to have a security defense function.
  • the specific implementation of the dynamic heterogeneous redundancy mechanism does not belong to the scope of this case and will not be repeated here.
  • the input agent module and the output agent module may be in one-to-one correspondence with the service executive body.
  • the input agent modules and output agent modules with the same number can be divided into the same group as the business executive body, and the cleaning and scheduling can be carried out at the same time in the unit of group according to the result of the ruling.
  • FIG. 2 may also include a protocol stack, and the protocol stack is used to store a preset protocol. Specifically, it may include an internal protocol stack and an external protocol stack. In order to simplify the implementation and eliminate synchronization of the internal protocol stack, the input proxy module and output proxy module with the same number can be implemented by the same software and hardware functional unit.
  • the external protocol stack is used to ensure that each agent module communicates with the outside normally, that is, the state of the external protocol stack of the input agent module and the output agent module are kept consistent.
  • the state consistency can be achieved without a synchronization mechanism. If you use an existing protocol stack that cannot be modified, you need to add a new synchronization mechanism to keep the connection status consistent between the protocol stacks. For the case of only accepting connections and externally initiating connections, the processing methods are similar. For the case where only connections are accepted, the method shown in Figure 2 can be used directly. In the case of initiating a connection, you can add a new input or output to initiate a connection request, and the subsequent processing is exactly the same as the above method.
  • the input and output system applied to the network security defense system can also interact with the feedback control module for data interaction for strategic interaction, that is, the feedback control module can download to each module of the input and output system Sending strategies, such as inputting agent strategies and receiving strategies reported by various modules, and further, the feedback control module can also interact strategies with business executives.
  • Figure 2 shows the input and output system applied to the network security defense system.
  • the input and output are divided into basic functions and complex functions.
  • the basic functions implement single-point communication functions, and the basic functions and complex functions are configured with security defenses.
  • Fig. 3 is another input and output system applied to a network security defense system disclosed in an embodiment of the application. Compared with Fig. 2, the difference is that the number of input proxy modules is only one, and dynamic heterogeneous redundancy is no longer adopted. mechanism.
  • the input proxy receives the user request message, and sends the user request message to the input branching module.
  • the input splitting module is used to copy the user request message into multiple copies and distribute the multiple user request messages to the service executive.
  • the service executive body can also be connected to the input and output system applied to the network security defense system through the network management and scheduling module (which can be regarded as an implementation of the feedback control module).
  • the functions of the modules in the solid-line box can be implemented by modifying existing software.
  • the modules in the dashed frame can be implemented by modifying existing hardware and/or software. Those skilled in the art can implement the modification in the content of the function description section above, which will not be repeated here.
  • FIG. 4 is another input and output system applied to a network security defense system disclosed in an embodiment of the application, including: a structural coding unit and an error correction decoding unit.
  • the structural coding unit is divided into: input branching module and input proxy module.
  • the number of input agent modules is only one, and the dynamic heterogeneous redundancy mechanism is no longer adopted.
  • the input proxy receives the user request message, and sends the user request message to the input branching module.
  • the input splitting module is used to copy the user request message into multiple copies and distribute the multiple user request messages to the service executive.
  • the error correction decoding unit is divided into: voting module, output routing module and output proxy module.
  • the number of output proxy modules is only one, and the dynamic heterogeneous redundancy mechanism is no longer adopted.
  • the voting module is used to directly vote on the output result of the proxy module.
  • the function of the output routing module is the same as the previous embodiment.
  • the functions described in the methods of the embodiments of the present application are implemented in the form of software functional units and sold or used as independent products, they can be stored in a storage medium readable by a computing device.
  • the software product is stored in a storage medium and includes several instructions to make a A computing device (which may be a personal computer, a server, a mobile computing device, or a network device, etc.) executes all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disks or optical disks and other media that can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Hardware Redundancy (AREA)

Abstract

本申请提供了应用于网络安全防御系统的输入输出系统,对结构编码单元和纠错译码单元进行划分,结构编码单元被划分为输入分路模块和输入代理模块,纠错译码单元被划分为输出选路模块、输出代理模块、裁决分路模块、裁决代理模块和表决模块。输入分路模块用于报文的复制和分发,裁决分路模块用于数据的复制和分发,表决模块用于表决,输出选路模块用于依据表决模块的表决结果,从输出代理模块的处理结果中选择输出结果。被划分出的输出选路模块、裁决分路模块和表决模块的功能简单,被验证无后门。因为上述模块和单元具备记忆消除功能,且输入代理、输出代理模块和裁决代理模块可以使用动态异构冗余机制设置,所以输入端和输出端具备较高的安全性。

Description

应用于网络安全防御系统的输入输出系统
本申请要求于2020年06月09日提交中国专利局、申请号为202010519102.X、发明名称为“应用于网络安全防御系统的输入输出系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及电子信息领域,尤其涉及一种应用于网络安全防御系统的输入输出系统。
背景技术
就一般意义而言,网络空间信息系统的各种计算机、和信息与通信设备都可以视为图灵机的某种表达,可以接受、存储和运行一段能用图灵机描述的程序,运行该程序可实现所描述的算法,因此,网络空间信息系统可以抽象为,一种有处理能力的可重构有记忆信道。网络空间信息系统的安全性是目前的研究热点。
发明内容
申请人在研究的过程中,提出了一种网络安全防御系统,如图1所示,在图1所示的系统中,使用动态异构冗余机制作为安全防御的手段之一。但该系统的输入端和输出端,具有单点通信的特点,而单点通信无法使用动态异构冗余机制,因此,如何提高图1所示的系统的输出端和输出端的安全性,成为亟待解决的技术问题。
本申请提供了一种应用于网络安全防御系统的输入输出系统,目的在于提高应用于网络安全防御系统的输入输出的安全性的问题。
为了实现上述目的,本申请提供了以下技术方案:
一种应用于网络安全防御系统的输入输出系统,包括:
结构编码单元和纠错译码单元;
所述结构编码单元被划分为:输入分路模块和输入代理模块,所述输入分路模块用于报文的复制和分发,且被验证无后门,以及具备记忆消除功能,所述记忆消除功能用于消除对于广义扰动影响的记忆;
所述纠错译码单元被划分为:输出选路模块、输出代理模块、裁决分路模块、裁决代理模块和表决模块;
所述裁决分路模块用于数据的复制和分发;所述表决模块用于表决;所述输出选路模块用于依据所述表决模块的表决结果,从所述输出代理模块的处理结果中选择输出结果;
所述输出选路模块、裁决分路模块和表决模块被验证无后门,且具备所述记忆消除功能;
至少所述输出代理模块和所述裁决代理模块使用动态异构冗余机制设置。
可选地,输入分路模块、所述输出选路模块、所述裁决分路模块和所述表决模块中的任意一个模块为目标模块;
所述目标模块包括:
被配置冗余和替换机制的模块,和\或,被配置非随机扰动记忆消除机制的模块;
所述冗余和替换机制使得所述目标模块消除对随机扰动影响的记忆;
所述非随机扰动记忆消除机制包括:程序固化、程序防篡改、数据初始化和数据防篡改中的至少一项。
可选地,程序固化包括:
固化所述目标模块中运行的程序,使得所述程序的逻辑不可更改,和/或,对使用者固化所述目标模块中运行的程序,使得所述使用者不可更改所述程序的逻辑;
所述程序防篡改包括以下至少一项:
对比所述程序和所述程序的备份程序,并响应于所述程序与所述备份程序的逻辑不同,使用所述备份程序替换所述程序;
基于所述程序中预设的恢复方法,周期性或非周期性恢复所述程序;
基于预设的校验方法,实时或非实时校验所述程序;
基于预设的加密或纠错编码,实时或非实时纠错所述程序。
可选地,数据初始化包括:
初始化所述数据的存储空间,和/或,清理所述数据的存储空间;
所述数据防篡改包括以下至少一项:
对比所述数据与所述数据的备份数据,并响应于所述数据与所述备份数据不同,使用所述备份数据替换所述数据;
基于所述数据中预设的校验、加密或纠错编码,校验或纠错所述数据,并响应于校验结果指示所述数据更改,初始化所述数据。
可选地,输入分路模块用于将接收到的用户请求报文复制为多份,并将多份所述用户请求报文分发给所述输入代理模块;
所述输入代理模块使用动态异构冗余机制设置。
可选地,输入代理模块用于接收用户请求报文,并将所述用户请求报文发送至所述输入分路模块;
所述输入分路模块用于,将所述用户请求报文复制为多份,并将多份所述用户请求报文分发给业务执行体。
一种应用于网络安全防御系统的输入输出系统,包括:
结构编码单元和纠错译码单元;
所述结构编码单元被划分为:输入分路模块和输入代理模块,所述输入分路模块用于报文的复制和分发,且被验证无后门,以及具备记忆消除功能,所述记忆消除功能用于消除对于广义扰动影响的记忆;
所述纠错译码单元被划分为:表决模块、输出选路模块和输出代理模块;
所述表决模块用于表决;所述输出选路模块用于依据所述表决模块的表决结果,从所述输出代理模块的处理结果中选择输出结果;
所述输出选路模块和表决模块被验证无后门,且具备所述记忆消除功能。
可选地,输入分路模块、所述输出选路模块、和所述表决模块中的任意一个模块为目标模块;
所述目标模块包括:
被配置冗余和替换机制的模块,和\或,被配置非随机扰动记忆消除机制的模块;
所述冗余和替换机制使得所述目标模块消除对随机扰动影响的记忆;
所述非随机扰动记忆消除机制包括:程序固化、程序防篡改、数据初始化和数据防篡改中的至少一项。
可选地,程序固化包括:
固化所述目标模块中运行的程序,使得所述程序的逻辑不可更改,和/或,对使用者固化所述目标模块中运行的程序,使得所述使用者不可更改所述程序的逻辑。
所述程序防篡改包括以下至少一项:
对比所述程序和所述程序的备份程序,并响应于所述程序与所述备份程序的逻辑不同,使用所述备份程序替换所述程序;
基于所述程序中预设的恢复方法,周期性或非周期性恢复所述程序;
基于预设的校验方法,实时或非实时校验所述程序;
基于预设的加密或纠错编码,实时或非实时纠错所述程序。
可选地,数据初始化包括:
初始化所述数据的存储空间,和/或,清理所述数据的存储空间。
所述数据防篡改包括以下至少一项:
对比所述数据与所述数据的备份数据,并响应于所述数据与所述备份数据不同,使用所述备份数据替换所述数据;
基于所述数据中预设的校验、加密或纠错编码,校验或纠错所述数据,并响应于校验结果指示所述数据更改,初始化所述数据。
本申请所述的应用于网络安全防御系统的输入输出系统,对结构编码单元和纠错译码单元进行划分,结构编码单元被划分为输入分路模块和输入代理模块,纠错译码单元被划分为输出选路模块、输出代理模块、裁决分路模块、裁决代理模块和表决模块。因为输入分路模块用于报文的复制和分发,裁决分路模块用于数据的复制和分发,表决模块用于表决,输出选路模块用于依据表决模块的表决结果,从输出代理模块的处理结果中选择输出结果,可见,被划分 出的输出选路模块、裁决分路模块和表决模块的功能简单,因此,能够被验证无后门,并且,因为上述模块和单元具备用于消除对于广义扰动影响的记忆的记忆消除功能,又因为输入代理模块、输出代理模块和所述裁决代理模块可以使用动态异构冗余机制设置从而具备安全防御特性,所以,输入端和输出端具备较高的安全性。
附图说明
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为安全防御系统的结构示意图;
图2为本申请实施例公开的一种应用于网络安全防御系统的输入输出系统的结构示意图;
图3为本申请实施例公开的又一种应用于网络安全防御系统的输入输出系统的结构示意图;
图4为本申请实施例公开的又一种应用于网络安全防御系统的输入输出系统的结构示意图。
具体实施方式
图1为申请人提出的一种安全防御系统,其中,使用动态异构冗余机制防御广义扰动导致的后门和漏洞。但申请人在研究的过程中发现,输入端和输出 端为单点通信,例如,输入端接收用户输入的请求报文,用户通常只会发送一次请求报文,所以,输入端和输出端不适用于动态异构冗余机制。因此,如何提高输入端和输出端的安全性,成为图1所示的系统亟待解决的问题。
面对上述问题,申请人从广义扰动导致的后门和漏洞的角度考虑,只要能消除后门和漏洞,即可提高安全性。因此,申请人创新性将输入端和输出端的功能划分为基本功能(具有单点通信的特点)和复杂功能,因为基本功能简单,所以,能够通过形式化验证,保证无后门,在此情况下,只要能够消除基本功能对于广义扰动导致的漏洞,即实现对广义扰动影响的记忆的可消除,即可实现基本功能的安全防御。
而因为将单点通信的功能分配至基本功能中,所以,复杂功能适用于动态异构冗余机制,从而实现安全防御。
基于申请人提出的上述创新性的原理,本申请公开了一种应用于网络安全防御系统的输入输出系统,用于提高输入端和输出端的安全性。需要说明的是,虽然本申请公开的输入输出系统以图1所示的系统为出发点设计,但并不限定于图1所示的系统,只要有安全防御需求的输入和输出系统,均可以使用本案公开的输入输出系统。
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
图2为本申请实施例公开的一种应用于网络安全防御系统的输入输出系统,包括:
结构编码单元和纠错译码单元;
其中,结构编码单元被划分为:输入分路模块和输入代理模块。纠错译码单元被划分为:输出选路模块、输出代理模块、裁决分路模块、裁决代理模块和表决模块。
结构编码单元和纠错译码单元基于上述结构的划分,实现输入和输出功能的流程如下:
1、输入分路模块用于实现报文的复制和分发功能。功能实现的具体方式,可以参见现有技术。
可选的,复制和分发功能的一种举例为:将接收到的用户请求报文复制为多份,并将多份用户请求报文分发给输入代理模块,图2中,以N个输入代理为例。
2、输入代理模块用于实现用户通信连接终结、执行体连接发起、用户业务请求报文适配(指纹消除、随机变换等)功能。功能实现的一种举例为:将接收到的用户请求报文发送至业务执行体。功能实现的具体方式,可以参见现有技术。
3、输出代理模块用于实现用户通信连接终结、执行体连接发起、用户业务请求报文适配(指纹消除、随机变换等)功能。
功能实现的一种举例为:接收业务执行体响应用户请求报文输出的执行体响应报文,输出归一化特征值(如Hash值),以适配执行体业务响应。
功能实现的具体方式,可以参见现有技术。
4、裁决分路模块用于实现数据的复制和分发功能。例如,将输出代理模块输出端的归一化特征值复制为多份,并分发给裁决代理模块。功能实现的具 体方式,可以参见现有技术。
5、裁决代理模块用于根据预设的裁决算法,对输入的数据裁决,并输出裁决结果。例如,对N个归一化特征值进行裁决,输出以执行体编号矢量为内容的裁决结果。功能实现的具体方式,可以参见现有技术。
6、表决模块用于实现表决功能。例如,对输入的N个执行体编号向量,逐位进行择多,输出1个每位都是多数一致的执行体编号向量。功能实现的具体方式,可以参见现有技术。
7、输出选路模块用于实现从多个输出代理模块中,选择一个输出代理响应进行输出的功能。例如,依据表决结果指示的执行体编号向量,随机选择一个经过输出适配后的1个执行体响应报文。功能实现的具体方式,可以参见现有技术。
从以上流程可以看出,输出选路模块、裁决分路模块和表决模块用于实现基本功能,因此,可以通过形式化验证(即在设计阶段穷举所有功能进行验证,保证使用过程中所有功能都是安全的)确保无后门。
因此,只要输出选路模块、裁决分路模块和表决模块能够消除对于广义扰动影响的记忆,即可实满足基本功能的安全需求。
将输入分路模块、输出选路模块、裁决分路模块和表决模块中的任意一个模块称为目标模块,目标模块消除记忆的方式包括以下几种:
1、目标模块为被配置冗余和替换机制的模块。
冗余和替换机制是指,使用冗余(例如多个)硬件和/或软件,在一个的可靠性降低后,使用另一个替换掉可靠性降低的硬件和/或软件,以提高可靠性。
例如,本实施例中的输入表决模块为多个表决器,表决器作为物理器件,不受非随机扰动的影响,但因为有寿命,所以可靠性会降低。因此,使用两个表决器,一个作为当前使用的器件,另一个作为冗余备份,在当前使用的表决器因为可靠性降低而出现故障的情况下,启动另一个。
在目标模块为物理器件(即硬件)的情况下,各代理模块(包括输入代理模块、输出代理模块、和裁决代理模块)也为硬件(例如包括处理器和存储器),其上运行有实现各个代理模块的功能的程序。
2、目标模块为被配置非随机扰动记忆消除机制的模块。
其中,非随机扰动记忆消除机制包括:程序固化、程序防篡改、数据初始化和数据防篡改中的至少一项。
具体的,程序固化的方式包括:固化目标模块中运行的程序,使得程序的逻辑不可更改,和/或,对使用者固化目标模块中运行的程序,使得使用者不可更改程序的逻辑。固化程序的具体手段可以参见现有技术。
程序防篡改包括以下至少一项:
(1)对比程序和程序的备份程序,并响应于程序与备份程序的逻辑不同,使用述备份程序替换程序。
(2)基于程序中预设的恢复方法,周期性或非周期性恢复程序。
(3)基于预设的校验方法,实时或非实时校验程序。
(4)基于预设的加密或纠错编码,实时或非实时纠错程序。
数据初始化的方式包括:
初始化数据的存储空间,和/或,清理数据的存储空间。
数据防篡改包括以下至少一项:
(1)对比数据与数据的备份数据,并响应于数据与所述备份数据不同,使用备份数据替换数据。
(2)基于数据中预设的校验、加密或纠错编码,校验或纠错数据,并响应于校验结果指示数据更改,初始化数据。
非随机扰动记忆消除机制的上述具体实现方式,可以基于软件和/或硬件实现。
基于上述目标模块,本实施例中用于实现基本功能的各个模块,具有安全防御功能。
此外,图2中的输入代理模块、输出代理模块和裁决代理模块使用动态异构冗余机制设置,以使其具备安全防御功能。动态异构冗余机制的具体实现方式,不属于本案的范畴,这里不再赘述。
可选的,图2中的各个冗余的代理模块,为了方便管理,输入代理模块、输出代理模块可与业务执行体一一对应。编号相同的输入代理模块、输出代理模块可以与业务执行体可以划分为同一组,在清洗、调度时可以以组为单位根据裁决结果同时进行。
可选的,图2中还可以包括协议栈,协议栈用于存储预设的协议。具体的,可以包括对内协议栈和对外协议栈,对内协议栈为简化实现和消除对内协议栈同步,相同编号的输入代理模块和输出代理模块可以由同一个软硬件功能单元实现。对外协议栈用于保证各代理模块与外部通信正常,即使得输入代理模块和输出代理模块的对外协议栈的状态保持一致。
进一步的,如果采用新研的自动状态机方式,无需同步机制即可实现状态一致。如果使用无法改造的现有协议栈,则需新增同步机制,在各协议栈之间 保持连接状态一致。对于只接受连接和对外发起连接情况,其处理方式类似。对于只接受连接的情况,直接采用图2所示的方法即可。对于发起连接情况,可以新增输入端或输出端发起一个连接请求,后续处理与上面方式完全相同。
可选的,如图2所示,应用于网络安全防御系统的输入输出系统,还可以与反馈控制模块进行数据交互,以进行策略的交互,即反馈控制模块可以向输入输出系统的各个模块下发策略,例如输入代理策略,并接收各个模块上报的策略,进一步的,反馈控制模块还可以与业务执行体交互策略。
图2所示的应用于网络安全防御系统的输入输出系统,将输入端和输出端按照基本功能和复杂功能进行划分,基本功能实现单点通信功能,并分别对基本功能和复杂功能配置安全防御机制,从而实现保证输入端和输出端的单点通信的前提下,提高输入端和输出端的安全性。
可以理解的是,为了降低实现难度和成本,图2所示的应用于网络安全防御系统的输入输出系统,可以进行适当简化,图3和图4分别为简化后的系统。
图3为本申请实施例公开的又一种应用于网络安全防御系统的输入输出系统,与图2相比,区别在于:输入代理模块的数量仅为一个,而不再采用动态异构冗余机制。输入代理接收用户请求报文,并将用户请求报文发送至输入分路模块。输入分路模块用于将用户请求报文复制为多份,并将多份用户请求报文分发给业务执行体。
图3中的其它模块的功能和实现方式,均可参见图2,这里不再赘述。
可选的,在实际中,业务执行体还可以通过网管和调度模块(可以看作反馈控制模块的一种实现方式)与应用于网络安全防御系统的输入输出系统相 连。图3中,实线框中的模块的功能可以通过改造现有的软件实现。虚线框中的模块,可以通过改造现有的硬件和/或软件实现。本领域技术人员可以在上述功能说明部分的内容,实现改造,这里不再赘述。
图3所示的系统,与图2相比,对输入代理模块进行了简化,因此能够减低成本,但仍然可以满足安全防御的需求。因此,能够实现安全和成本之间的平衡。
图4为本申请实施例公开的又一种应用于网络安全防御系统的输入输出系统,包括:结构编码单元和纠错译码单元。
结构编码单元被划分为:输入分路模块和输入代理模块。输入代理模块的数量仅为一个,而不再采用动态异构冗余机制。输入代理接收用户请求报文,并将用户请求报文发送至输入分路模块。输入分路模块用于将用户请求报文复制为多份,并将多份用户请求报文分发给业务执行体。
纠错译码单元被划分为:表决模块、输出选路模块和输出代理模块。输出代理模块的数量仅为一个,而不再采用动态异构冗余机制。表决模块用于直接对代理模块的输出结果进行表决。输出选路模块的功能如前述实施例。
图4所示的系统,虽然输入端和输出端的复杂功能不再使用动态异构冗余机制,但因为基本功能还是可以被验证无后门且具备记忆消除功能,所以,只需针对输入代理模块和输出代理模块设计安全防御机制即可,与现有技术中,没有划分基本功能和复杂功能的输入端和输出端相比,更易实现安全防御。并且,因为结构简单,所以实现难度和成本很低。
本申请实施例方法所述的功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算设备可读取存储介质中。基于这样的理解,本申请实施例对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该软件产品存储在一个存储介质中,包括若干指令用以使得一台计算设备(可以是个人计算机,服务器,移动计算设备或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
本说明书中各个实施例采用递进的方式描述,每个实施例重点说明的都是与其它实施例的不同之处,各个实施例之间相同或相似部分互相参见即可。对所公开的实施例的上述说明,使本领域专业技术人员能够实现或使用本申请。对这些实施例的多种修改对本领域的专业技术人员来说将是显而易见的,本文中所定义的一般原理可以在不脱离本申请的精神或范围的情况下,在其它实施例中实现。因此,本申请将不会被限制于本文所示的这些实施例,而是要符合与本文所公开的原理和新颖特点相一致的最宽的范围。

Claims (10)

  1. 一种应用于网络安全防御系统的输入输出系统,其特征在于,包括:
    结构编码单元和纠错译码单元;
    所述结构编码单元被划分为:输入分路模块和输入代理模块,所述输入分路模块用于报文的复制和分发,且被验证无后门,以及具备记忆消除功能,所述记忆消除功能用于消除对于广义扰动影响的记忆;
    所述纠错译码单元被划分为:输出选路模块、输出代理模块、裁决分路模块、裁决代理模块和表决模块;
    所述裁决分路模块用于数据的复制和分发;所述表决模块用于表决;所述输出选路模块用于依据所述表决模块的表决结果,从所述输出代理模块的处理结果中选择输出结果;
    所述输出选路模块、裁决分路模块和表决模块被验证无后门,且具备所述记忆消除功能;
    至少所述输出代理模块和所述裁决代理模块使用动态异构冗余机制设置。
  2. 根据权利要求1所述的系统,其特征在于,所述输入分路模块、所述输出选路模块、所述裁决分路模块和所述表决模块中的任意一个模块为目标模块;
    所述目标模块包括:
    被配置冗余和替换机制的模块,和\或,被配置非随机扰动记忆消除机制的模块;
    所述冗余和替换机制使得所述目标模块消除对随机扰动影响的记忆;
    所述非随机扰动记忆消除机制包括:程序固化、程序防篡改、数据初始化 和数据防篡改中的至少一项。
  3. 根据权利要求2所述的系统,其特征在于,所述程序固化包括:
    固化所述目标模块中运行的程序,使得所述程序的逻辑不可更改,和/或,对使用者固化所述目标模块中运行的程序,使得所述使用者不可更改所述程序的逻辑;
    所述程序防篡改包括以下至少一项:
    对比所述程序和所述程序的备份程序,并响应于所述程序与所述备份程序的逻辑不同,使用所述备份程序替换所述程序;
    基于所述程序中预设的恢复方法,周期性或非周期性恢复所述程序;
    基于预设的校验方法,实时或非实时校验所述程序;
    基于预设的加密或纠错编码,实时或非实时纠错所述程序。
  4. 根据权利要求2所述的系统,其特征在于,所述数据初始化包括:
    初始化所述数据的存储空间,和/或,清理所述数据的存储空间;
    所述数据防篡改包括以下至少一项:
    对比所述数据与所述数据的备份数据,并响应于所述数据与所述备份数据不同,使用所述备份数据替换所述数据;
    基于所述数据中预设的校验、加密或纠错编码,校验或纠错所述数据,并响应于校验结果指示所述数据更改,初始化所述数据。
  5. 根据权利要求1-4任一项所述的系统,其特征在于,所述输入分路模块用于将接收到的用户请求报文复制为多份,并将多份所述用户请求报文分发给所述输入代理模块;
    所述输入代理模块使用动态异构冗余机制设置。
  6. 根据权利要求1-4任一项所述的系统,其特征在于,所述输入代理模块用于接收用户请求报文,并将所述用户请求报文发送至所述输入分路模块;
    所述输入分路模块用于,将所述用户请求报文复制为多份,并将多份所述用户请求报文分发给业务执行体。
  7. 一种应用于网络安全防御系统的输入输出系统,其特征在于,包括:
    结构编码单元和纠错译码单元;
    所述结构编码单元被划分为:输入分路模块和输入代理模块,所述输入分路模块用于报文的复制和分发,且被验证无后门,以及具备记忆消除功能,所述记忆消除功能用于消除对于广义扰动影响的记忆;
    所述纠错译码单元被划分为:表决模块、输出选路模块和输出代理模块;
    所述表决模块用于表决;所述输出选路模块用于依据所述表决模块的表决结果,从所述输出代理模块的处理结果中选择输出结果;
    所述输出选路模块和表决模块被验证无后门,且具备所述记忆消除功能。
  8. 根据权利要求7所述的系统,其特征在于,所述输入分路模块、所述输出选路模块、和所述表决模块中的任意一个模块为目标模块;
    所述目标模块包括:
    被配置冗余和替换机制的模块,和\或,被配置非随机扰动记忆消除机制的模块;
    所述冗余和替换机制使得所述目标模块消除对随机扰动影响的记忆;
    所述非随机扰动记忆消除机制包括:程序固化、程序防篡改、数据初始化和数据防篡改中的至少一项。
  9. 根据权利要求8所述的系统,其特征在于,所述程序固化包括:
    固化所述目标模块中运行的程序,使得所述程序的逻辑不可更改,和/或,对使用者固化所述目标模块中运行的程序,使得所述使用者不可更改所述程序的逻辑;
    所述程序防篡改包括以下至少一项:
    对比所述程序和所述程序的备份程序,并响应于所述程序与所述备份程序的逻辑不同,使用所述备份程序替换所述程序;
    基于所述程序中预设的恢复方法,周期性或非周期性恢复所述程序;
    基于预设的校验方法,实时或非实时校验所述程序;
    基于预设的加密或纠错编码,实时或非实时纠错所述程序。
  10. 根据权利要求8所述的系统,其特征在于,所述数据初始化包括:
    初始化所述数据的存储空间,和/或,清理所述数据的存储空间;
    所述数据防篡改包括以下至少一项:
    对比所述数据与所述数据的备份数据,并响应于所述数据与所述备份数据不同,使用所述备份数据替换所述数据;
    基于所述数据中预设的校验、加密或纠错编码,校验或纠错所述数据,并响应于校验结果指示所述数据更改,初始化所述数据。
PCT/CN2021/098596 2020-06-09 2021-06-07 应用于网络安全防御系统的输入输出系统 WO2021249335A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US17/789,082 US20230039521A1 (en) 2020-06-09 2021-06-07 Input/output system applied to network security defense system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010519102.XA CN112217604B (zh) 2020-06-09 2020-06-09 应用于网络安全防御系统的输入输出系统
CN202010519102.X 2020-06-09

Publications (1)

Publication Number Publication Date
WO2021249335A1 true WO2021249335A1 (zh) 2021-12-16

Family

ID=74058603

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/098596 WO2021249335A1 (zh) 2020-06-09 2021-06-07 应用于网络安全防御系统的输入输出系统

Country Status (3)

Country Link
US (1) US20230039521A1 (zh)
CN (1) CN112217604B (zh)
WO (1) WO2021249335A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10628186B2 (en) * 2014-09-08 2020-04-21 Wirepath Home Systems, Llc Method for electronic device virtualization and management
CN112217604B (zh) * 2020-06-09 2022-09-20 国家数字交换系统工程技术研究中心 应用于网络安全防御系统的输入输出系统
CN113014356B (zh) * 2021-02-09 2022-05-27 中国人民解放军战略支援部队信息工程大学 基于数据编码的数据处理方法及装置、设备
CN112929129B (zh) * 2021-02-09 2022-07-12 中国人民解放军战略支援部队信息工程大学 基于动态冗余异构编码的数据处理系统、方法及设备

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110177084A (zh) * 2019-04-04 2019-08-27 上海红阵信息科技有限公司 用于防御网络攻击的分布式存储系统元服务结构、构建方法及系统架构
CN112217604A (zh) * 2020-06-09 2021-01-12 国家数字交换系统工程技术研究中心 应用于网络安全防御系统的输入输出系统

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1059578A3 (en) * 1999-06-07 2003-02-05 Hewlett-Packard Company, A Delaware Corporation Secure backdoor access for a computer
WO2010073922A1 (ja) * 2008-12-25 2010-07-01 日本電気株式会社 誤り訂正符号化装置、復号装置、符号化方法、復号方法、及びそのプログラム
US10649747B2 (en) * 2015-10-07 2020-05-12 Andreas Voellmy Compilation and runtime methods for executing algorithmic packet processing programs on multi-table packet forwarding elements
CN108134740B (zh) * 2017-12-08 2020-08-14 中国电子科技集团公司第三十研究所 一种基于物理异构冗余的加权裁决及随机调度方法
CN110381008B (zh) * 2018-04-13 2022-02-25 海南波克科技有限公司 一种基于大数据的网络安全动态防御系统及方法
CN109525594B (zh) * 2018-12-24 2021-03-23 中国人民解放军战略支援部队信息工程大学 一种异构冗余网络中后门部署方法及装置
CN110535843B (zh) * 2019-08-20 2022-03-22 之江实验室 一种拟态裁决参数消息同步的装置和方法

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110177084A (zh) * 2019-04-04 2019-08-27 上海红阵信息科技有限公司 用于防御网络攻击的分布式存储系统元服务结构、构建方法及系统架构
CN112217604A (zh) * 2020-06-09 2021-01-12 国家数字交换系统工程技术研究中心 应用于网络安全防御系统的输入输出系统

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
MA HAILONG, YI PENG; JIANG YIMING; HE LEI: "Dynamic Heterogeneous Redundancy based Router Architecture with Mimic Defenses", JOURNAL OF CYBER SECURITY, INSTITUTE OF INFORMATION ENGINEERING, CHINESE ACADEMY OF SCIENCES; CHINA SCIENCE AND TECHNOLOGY, CN, vol. 2, no. 1, 1 January 2017 (2017-01-01), CN , pages 29 - 42, XP055878460, ISSN: 2096-1146, DOI: 10.19363/j.cnki.cn10-1380/tn.2017.01.003 *
WU ZHAOQI, ZHANG FAN; GUO WEI; WEI JIN; XIE GUANGWEI: "A Mimic Arbitration Optimization Method Based on Heterogeneous Degree of Executors", COMPUTER ENGINEERING, SHANGHAI JISUANJI XUEHUI, CN, vol. 46, no. 5, 1 May 2020 (2020-05-01), CN , pages 12 - 18, XP055878449, ISSN: 1000-3428, DOI: 10.19678/j.issn.1000-3428.0055996 *

Also Published As

Publication number Publication date
CN112217604A (zh) 2021-01-12
CN112217604B (zh) 2022-09-20
US20230039521A1 (en) 2023-02-09

Similar Documents

Publication Publication Date Title
WO2021249335A1 (zh) 应用于网络安全防御系统的输入输出系统
RU2723072C1 (ru) Достижение консенуса между сетевывыми узлами в распределенной системе
TWI705690B (zh) 分布式網路中進行主節點變更的系統
CN109361517B (zh) 一种基于云计算的虚拟化云密码机系统及其实现方法
JP7012879B2 (ja) 誤り訂正符号に基づく共有されたブロックチェーンデータの記憶のコンセンサス
CN100586058C (zh) 基于j2ee中间件规范的容忍入侵应用服务器及容忍入侵方法
JP7050955B2 (ja) 共有されたブロックチェーンデータの記憶の優先順位付け
JP7004423B2 (ja) 誤り訂正符号に基づく共有されたブロックチェーンデータの記憶のデータセキュリティ
KR100577314B1 (ko) 가상의 저장영역 네트워크를 설정하기 위한 네트워크 데이터의 미러링 방법 및 가상 저장영역 네트워크
US7984133B2 (en) Computer and access control method in a computer
US20160191239A1 (en) Methods and Computer Systems with Provisions for High Availability of Cryptographic Keys
US10530752B2 (en) Efficient device provision
US11356445B2 (en) Data access interface for clustered devices
AU2016238870A1 (en) Fault-tolerant key management system
WO2021249334A1 (zh) 应用于网络安全防御系统的网络安全防御方法及相关装置
US10621055B2 (en) Adaptive data recovery for clustered data devices
US20170149746A1 (en) License utilization management system service suite
WO2020024615A1 (zh) 一种共识流程恢复方法及相关节点
JP2022523217A (ja) 投票集計を伴うトポロジードリブンビザンチンフォールトトレラント合意プロトコル
Fitch et al. A RAID-based secure and fault-tolerant model for cloud information storage
EP3355190A1 (en) Device and system for maintaining a ditributed ledger
CN114448711A (zh) 一种拟态防御系统
US7979656B2 (en) Minimizing configuration changes in a fabric-based data protection solution
US20240048374A1 (en) Rekeying end-to-end efficient encryption with security chaining
US20240039704A1 (en) Enablement and disablement of end-to-end efficient encryption with security chaining

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21821414

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21821414

Country of ref document: EP

Kind code of ref document: A1