[go: up one dir, main page]

CN119814280A - A method for building a secure service chain based on data tags - Google Patents

A method for building a secure service chain based on data tags Download PDF

Info

Publication number
CN119814280A
CN119814280A CN202510294967.3A CN202510294967A CN119814280A CN 119814280 A CN119814280 A CN 119814280A CN 202510294967 A CN202510294967 A CN 202510294967A CN 119814280 A CN119814280 A CN 119814280A
Authority
CN
China
Prior art keywords
security
security service
data
service
service chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202510294967.3A
Other languages
Chinese (zh)
Other versions
CN119814280B (en
Inventor
肖毅
戴玲琳
张亮
罗劼夫
郝子龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CETC 30 Research Institute
Original Assignee
CETC 30 Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CETC 30 Research Institute filed Critical CETC 30 Research Institute
Priority to CN202510294967.3A priority Critical patent/CN119814280B/en
Publication of CN119814280A publication Critical patent/CN119814280A/en
Application granted granted Critical
Publication of CN119814280B publication Critical patent/CN119814280B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明公开了一种基于数据标签的安全服务链构建方法,涉及网络安全技术领域。本发明基于数据标签的安全服务链构建方法以数据为中心建立一体式绑定数据标签,以标签数据属性为匹配要素,以可扩展的服务链定义安全检测流程,在安全检测服务的注册、调用、判决的过程中加入可信度量和签名保护机制,提升了安全服务的可信度和安全性,实现安全防护能力动态扩展,数据精准交换和服务全流程执行安全问题。

The present invention discloses a method for constructing a security service chain based on data tags, and relates to the field of network security technology. The method for constructing a security service chain based on data tags of the present invention establishes an integrated binding data tag with data as the center, takes the tag data attribute as the matching factor, defines the security detection process with an extensible service chain, and adds a trusted measurement and signature protection mechanism in the registration, calling, and judgment process of the security detection service, thereby improving the credibility and security of the security service, realizing the dynamic expansion of security protection capabilities, accurate data exchange, and security issues of the full-process execution of services.

Description

Safety service chain construction method based on data tag
Technical Field
The invention relates to the technical field of network security, in particular to a security service chain construction method based on a data tag.
Background
The statements in this section merely provide background information related to the present disclosure and may not constitute prior art.
At present, cross-network and cross-domain data exchange relates to different network systems and different service systems, and as various information systems are continuously developed, the data exchange is various. According to the service type, the service types are mainly classified into file types, formatted data types, video types, audio types, database types and the like. Meanwhile, the network attack technical means are continuously developed, the facing security threat is also continuously increased, so that the security inspection means with fixed capacity cannot meet the security protection requirement of cross-network cross-domain data exchange, the security protection function must be timely adjusted according to the facing security threat, the security protection means is added, and the security operation of the cross-network cross-domain data exchange is ensured.
The cross-network and cross-domain data security processing mainly comprises two major aspects of security inspection and security control, wherein the security inspection realizes data protocol and legal compliance of content, such as virus inspection and killing, content inspection, protocol filtering and the like through various detection technical means, and the security control is to conduct data flow and exchange control by taking data as a center according to an exchange strategy. However, if a cut-off or customized security check and exchange control means is adopted, the method cannot meet the diversified cross-domain exchange application of different network systems and different service data.
At present, dynamic expansion of security capability can be realized through NFV and service chain construction, data flow and exchange control based on attributes can be performed based on data labels aiming at data exchange control, but two technologies are applied to different scenes or different products, and a unified fusion solution capable of solving security inspection and security control is not available aiming at cross-network and cross-domain security processing requirements.
Disclosure of Invention
Aiming at the requirements of cross-network cross-domain security inspection and security control, the invention provides a security service chain construction method based on a data tag for meeting the requirements of suitability, high efficiency, strong control, security and the like of cross-network exchange security processing, so as to solve the following problems:
1) Aiming at the security protection requirements of different diversified data and the security attack threat problem which is continuously developed, the security protection capability has the capability of dynamic expansion;
2) The security enhancement is needed to be carried out on the security service provided by the network system, so that the problems of counterfeit service call, falsification of the calling process, counterfeit execution result and the like can be prevented;
3) The cross-network information network relates to different services of different networks, not only ensures the compliance of data content, but also needs to accurately control various attributes such as data sources, known ranges, time control and the like, and realizes accurate circulation and exchange in the data exchange process.
Aiming at the problems, the method for constructing the safety service chain based on the data tag establishes an integrated binding data tag by taking the data as a center, takes the tag data attribute as a matching element, defines a safety detection flow by using an expandable service chain, adds a credibility measurement and signature protection mechanism in the process of registering, calling and judging the safety detection service, improves the credibility and safety of the safety service, realizes dynamic expansion of safety protection capability, and realizes accurate data exchange and safety problem execution of the whole service flow.
The technical scheme of the invention is as follows:
A security service chain construction method based on a data tag comprises the following steps:
Generating an integral binding data tag corresponding to original data content to be transmitted according to an integral binding data tag format, wherein the integral binding data tag format comprises user data, tag attributes and a security service chain, wherein the user data is the original data content to be transmitted, the tag attributes comprise a data version number, an application type, a security level, a sending/receiving unit, a time stamp, an extensible field and a tag abstract, and the security service chain comprises a security service sequence, security service execution time, security service signature information, security service key information metric value and an execution sequence rule based on security policy configuration;
Invoking a security service chain, executing each security service according to a security service sequence, and comparing key information metric values of the security service in the execution process to ensure the security service to be credible;
And performing two-stage exchange control verification based on the tag attribute, if the two-stage verification is passed and the execution result of the security service chain is compliant, allowing data flow, otherwise blocking and alarming.
Further, the extensible field supports custom extensions to business requirements for storing additional control attributes.
Further, the security services include virus scanning, content filtering, signature verification.
Further, the security service key information metric value is a key information hash value of the security service, including a service version number, a configuration parameter and a signature public key.
Further, the construction of the security service chain includes:
Establishing a secure service resource pool and a three-party service resource pool, and registering secure service through a service bus;
and arranging a security service chain according to the data type and the security policy.
Further, the invoking the secure service chain includes:
Verifying the integrity and signature authenticity of the security service chain based on the registered security service and the arranged security service chain;
calling registered security service according to the security service sequence, and comparing key information metric values of the security service in the security service execution process to ensure the service credibility;
Writing the execution result of each security service into a security service chain, and performing signature protection.
Further, the two-stage exchange control verification includes:
The first-stage verification, namely verifying the integrity of the data load and the label content through a hash algorithm;
And the second stage of verification, namely verifying the legality of data sources, data attributes and data forwarding according to the exchange control strategy and the data exchange authority.
Further, the construction of the secure service resource pool and the three-party service resource pool comprises the following steps:
based on a security function expansion mechanism of a security service chain, a service idea is adopted to service the security functions of multiple types of heterogeneous types, and a security service resource pool is established;
and integrating the three-party security service through function expansion to establish a three-party service resource pool, wherein the three-party service resource pool can be dynamically expanded.
Further, the final judgment is carried out by integrating the execution result of the security service, the signature verification and the integrity verification result, the discarding or blocking operation is carried out on the non-compliance data, and the judgment log is recorded.
Furthermore, the construction of the security service chain supports multi-network domain cooperation, and the data source and the destination are identified through the tag attribute, so that the accurate management and control of the cross-network cross-domain data exchange are realized.
Compared with the prior art, the invention has the beneficial effects that:
The prior art can realize safety dynamic expansion based on a service chain or classification and related safety processing based on a data tag, but is a solution which is not unified and fused in different scenes or different products. The invention creatively provides an integrated binding data tag, which binds three parts of user data, tag attributes and a security service chain, and effectively combines security inspection and exchange control elements, wherein the data fine granularity exchange control can be performed based on the tag attributes, and the security capability dynamic expansion can be realized based on the security service chain. The integrated binding data tag can enable the concurrent execution of security inspection and security control, and the processing efficiency is greatly improved. Meanwhile, signature and integrity protection are carried out on labels, service registration, call and results by combining a cryptographic technology, so that important judgment information is prevented from being tampered, the safety of the security service is greatly improved, and the requirements of suitability, high efficiency, strong control, safety and the like of cross-network exchange security processing are met.
Drawings
FIG. 1 is a schematic diagram of security check and exchange control fusion;
FIG. 2 is a schematic diagram of an integrated binding data tag;
fig. 3 is a schematic diagram of a security enhancement design for a security service chain.
Detailed Description
It is noted that relational terms such as "first" and "second", and the like, are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises an element.
The features and capabilities of the present invention are described in further detail below in connection with examples.
Example 1
Firstly, it should be noted that the cross-network and cross-domain data security processing mainly comprises two aspects of security check and security control, the invention organically fuses the two functions based on the integrated binding data label creatively, wherein the security check is based on the security service chain in the label for dynamic expansion and security detection, and the security control is based on the attribute in the label for accurate matching control.
Specifically, referring to fig. 1, a method for constructing a security service chain based on a data tag specifically includes the following steps:
Generating an integral binding data tag corresponding to original data content to be transmitted according to an integral binding data tag format, wherein the integral binding data tag format comprises user data, tag attributes and a safety service chain, wherein the user data is the original data content to be transmitted, the tag attributes comprise a data version number, an application type, a safety grade, a sending/receiving unit, a time stamp, an extensible field and a tag abstract, and the safety service chain comprises a safety service sequence (safety service is detection service), safety service execution time, safety service signature information, a safety service key information metric value and an execution sequence rule based on safety strategy configuration;
Invoking a security service chain, executing each security service according to a security service sequence, and comparing key information metric values of the security service in the execution process to ensure the security service to be credible;
And performing two-stage exchange control verification based on the tag attribute, if the two-stage verification is passed and the execution result of the security service chain is compliant, allowing data flow, otherwise blocking and alarming.
Referring to fig. 2, it should be noted that, in this embodiment, in order to organically combine two functions of dynamic expansion and fine switching control of security services, an integrated binding data tag is innovatively designed, which includes 3 parts, namely user data, tag attribute and security service chain;
the user data is the original data content to be transmitted, and is subjected to security check according to a security service sequence in a security service chain;
The tag attribute mainly comprises a data version number, an application type, a security level, a sending/receiving unit, a timestamp, an extensible field and a tag abstract, wherein the security level is the data level in the graph (totally called as the data security level), the sending/receiving unit comprises a sender, a sending unit, a receiver and a receiving unit in the graph, the timestamp comprises the sending time and the receiving time in the graph, the extensible field is reserved and supports custom extension according to service requirements and is used for storing additional control attributes, and the tag abstract is used for preventing the tag from being tampered in the transmission process and improving the security and the credibility of the tag;
And the security service chain writes related information such as security service, security service execution time, service signature and the like which are needed to be done by the data into the integrated binding data security tag according to security policy configuration.
In this embodiment, the security services include virus scanning, content filtering, signature verification, and the like.
In this embodiment, specifically, the security service key information metric value is a key information hash value of the security service, including a service version number, a configuration parameter, and a signature public key.
In this embodiment, specifically, the construction of the security service chain includes:
Establishing a secure service resource pool and a three-party service resource pool, and registering secure service through a service bus;
and arranging a security service chain according to the data type and the security policy.
In this embodiment, specifically, the invoking the security service chain includes:
Verifying the integrity and signature authenticity of the security service chain based on the registered security service and the arranged security service chain;
calling registered security service according to the security service sequence, and comparing key information metric values of the security service in the security service execution process to ensure the service credibility;
Writing the execution result of each security service into a security service chain, and performing signature protection.
In this embodiment, specifically, the two-stage exchange control verification includes:
the first-stage verification comprises verifying the integrity of the data load and the label content by a hash algorithm, namely generating an integrity check value by adopting the hash algorithm aiming at the data load and the label content, and verifying the integrity check value by each control point in the data exchange process to realize integrity protection;
And the second-stage verification is to verify the legality of data sources, data attributes and data forwarding according to the exchange control strategy and the data exchange authority, namely, in the cross-network cross-domain data exchange process, the tag attribute (namely, the control attribute) can be used as a core element for formulating the exchange control strategy and the data exchange authority strategy, and the data flow management and control based on the data security tag can be realized by identifying and extracting the tag attribute such as a network domain, a sender, a receiver, a sending unit, a receiving unit, a grade and an knowing range and comparing and matching the tag attribute with the exchange control strategy and the exchange authority strategy.
In this embodiment, specifically, the construction of the secure service resource pool and the three-party service resource pool includes:
based on a security function expansion mechanism of a security service chain, a service idea is adopted to service the security functions of multiple types of heterogeneous types, and a security service resource pool is established;
the method comprises the steps of integrating three-party security services through function expansion, establishing a three-party service resource pool, enabling the three-party service resource pool to be dynamically expanded, registering each security service through a service bus before dispatching, and dispatching only the security service which is successfully registered.
In this embodiment, specifically, the final decision is performed by integrating the security service execution result, signature verification and integrity verification result, and the discard or blocking operation is performed on the non-compliant data, and the decision log is recorded.
In this embodiment, specifically, the construction of the security service chain supports multi-domain collaboration, and identifies the source and destination of data through the tag attribute, so as to realize the accurate management and control of the cross-network and cross-domain data exchange.
In this embodiment, it should be noted that, the security function extension mechanism based on the security service chain adopts a service design concept to package various security functions in a service manner, flexibly and efficiently arrange and schedule corresponding security services according to different data types for processing, and make exchange validity judgment according to service execution results.
The core of service arrangement, service scheduling and service execution is a safety service chain, which is a 'flow sheet' output by service arrangement, is a 'baton' of a service calling process, is a 'physical examination sheet' of a service execution result, and the safety of the safety service chain is critical, and mainly comprises the following aspects:
(1) The risk of falsification and tampering of the secure service chain of the service orchestration output needs to be addressed.
(2) There is a need to address the issue of whether security services performed during service invocation are trusted.
(3) The problem of falsification resistance of service execution results is required to be solved.
Therefore, as shown in fig. 3, the security enhancement design based on the security service chain utilizes the cryptographic technology to carry out security enhancement on the whole process of service arrangement, service scheduling and service execution, and constructs the security service chain, so that the problems of service call impersonation, call process falsification, execution result impersonation and the like can be effectively prevented, and the execution of various security functions of parallel processing can be safer and more reliable.
Example two
The second embodiment is based on the further implementation of the security service chain construction method based on the data tag, and provides a data tag-based cross-network and cross-domain exchange data security processing system which comprises a service arrangement module, a service scheduling module and a security judgment module.
The service arrangement module establishes a plurality of service chains according to various data security processing strategies, each service chain comprises one or more different types of data security processing services and serial or parallel execution sequences, the service arrangement module outputs a security service chain after the service arrangement is finished, and the security service key information measurement values in the service registration process are recorded together and used for comparison of the execution process and integrity and authenticity protection of the generated security service chain.
In the execution process of the data exchange task, the service scheduling module identifies the data type to execute the corresponding safety service chain, firstly verifies the integrity and the authenticity of the safety service chain, performs safety service calling, compares the measurement value of the safety service in the calling process, and verifies the credibility of the safety service. After the service call is completed, the security service writes the checking or processing result back into the security service chain, and performs integrity protection, and confirms the service execution result of this time. The service scheduling module monitors the execution condition of the security service chain, and after all security services are executed, the execution result is uniformly checked and verified, so that the execution process is prevented from being bypassed and the execution result is prevented from being forged.
The security judgment module performs final comparison, analysis and judgment according to the execution result of the security check, signature verification, integrity verification and the like, decides whether the data content passes the security check, is legal and compliant, discards the data which is not legal and blocks traffic.
The above examples merely illustrate specific embodiments of the application, which are described in more detail and are not to be construed as limiting the scope of the application. It should be noted that it is possible for a person skilled in the art to make several variants and modifications without departing from the technical idea of the application, which fall within the scope of protection of the application.
This background section is provided to generally present the context of the present invention and the work of the presently named inventors, to the extent it is described in this background section, as well as the description of the present section as not otherwise qualify as prior art at the time of filing, are neither expressly nor impliedly admitted as prior art against the present invention.

Claims (10)

1. The method for constructing the security service chain based on the data tag is characterized by comprising the following steps of:
Generating an integral binding data tag corresponding to original data content to be transmitted according to an integral binding data tag format, wherein the integral binding data tag format comprises user data, tag attributes and a security service chain, wherein the user data is the original data content to be transmitted, the tag attributes comprise a data version number, an application type, a security level, a sending/receiving unit, a time stamp, an extensible field and a tag abstract, and the security service chain comprises a security service sequence, security service execution time, security service signature information, security service key information metric value and an execution sequence rule based on security policy configuration;
Invoking a security service chain, executing each security service according to a security service sequence, and comparing key information metric values of the security service in the execution process to ensure the security service to be credible;
And performing two-stage exchange control verification based on the tag attribute, if the two-stage verification is passed and the execution result of the security service chain is compliant, allowing data flow, otherwise blocking and alarming.
2. The method for constructing a security service chain based on a data tag according to claim 1, wherein the extensible field supports custom extension according to service requirements for storing additional control attributes.
3. The method for constructing a security service chain based on a data tag as recited in claim 1, wherein the security service comprises virus scanning, content filtering, and signature verification.
4. The method for constructing a security service chain based on a data tag according to claim 1, wherein the security service key information metric value is a key information hash value of a security service, including a service version number, a configuration parameter, and a signature public key.
5. The method for constructing a security service chain based on a data tag according to claim 1, wherein the construction of the security service chain comprises:
Establishing a secure service resource pool and a three-party service resource pool, and registering secure service through a service bus;
and arranging a security service chain according to the data type and the security policy.
6. The method for constructing a security service chain based on a data tag according to claim 5, wherein the invoking the security service chain comprises:
Verifying the integrity and signature authenticity of the security service chain based on the registered security service and the arranged security service chain;
calling registered security service according to the security service sequence, and comparing key information metric values of the security service in the security service execution process to ensure the service credibility;
Writing the execution result of each security service into a security service chain, and performing signature protection.
7. The method for constructing a security service chain based on a data tag according to claim 1, wherein the two-stage exchange control verification comprises:
The first-stage verification, namely verifying the integrity of the data load and the label content through a hash algorithm;
And the second stage of verification, namely verifying the legality of data sources, data attributes and data forwarding according to the exchange control strategy and the data exchange authority.
8. The method for constructing a security service chain based on a data tag according to claim 5, wherein the construction of the security service resource pool and the three-party service resource pool comprises:
based on a security function expansion mechanism of a security service chain, a service idea is adopted to service the security functions of multiple types of heterogeneous types, and a security service resource pool is established;
and integrating the three-party security service through function expansion to establish a three-party service resource pool, wherein the three-party service resource pool can be dynamically expanded.
9. The method for constructing a security service chain based on a data tag as set forth in claim 1, wherein the final decision is made by integrating the security service execution result, signature verification and integrity verification result, the discarding or blocking operation is performed on the non-compliant data, and the decision log is recorded.
10. The method for constructing a security service chain based on data labels according to claim 1, wherein the construction of the security service chain supports multi-domain collaboration, and the accurate management and control of cross-network and cross-domain data exchange is realized by identifying data sources and directions through label attributes.
CN202510294967.3A 2025-03-13 2025-03-13 Safety service chain construction method based on data tag Active CN119814280B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202510294967.3A CN119814280B (en) 2025-03-13 2025-03-13 Safety service chain construction method based on data tag

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202510294967.3A CN119814280B (en) 2025-03-13 2025-03-13 Safety service chain construction method based on data tag

Publications (2)

Publication Number Publication Date
CN119814280A true CN119814280A (en) 2025-04-11
CN119814280B CN119814280B (en) 2025-05-23

Family

ID=95268145

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202510294967.3A Active CN119814280B (en) 2025-03-13 2025-03-13 Safety service chain construction method based on data tag

Country Status (1)

Country Link
CN (1) CN119814280B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140050223A1 (en) * 2012-08-15 2014-02-20 Futurewei Technologies, Inc. Method and System for Creating Software Defined Ordered Service Patterns in a Communications Network
CN109635583A (en) * 2018-12-27 2019-04-16 中国电子科技集团公司第三十研究所 A kind of shared exchange method and system of the information security based on data safety label
CN117155599A (en) * 2023-06-26 2023-12-01 新华三信息安全技术有限公司 Service chain construction method, service access method, related device, equipment and medium
CN117938500A (en) * 2024-01-24 2024-04-26 北京工业大学 Method for realizing trusted cryptography hierarchical encryption service mechanism based on cloud environment
CN118074939A (en) * 2022-12-02 2024-05-24 广州图灵科技有限公司 A trusted data security isolation method for cloud multi-tenants

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140050223A1 (en) * 2012-08-15 2014-02-20 Futurewei Technologies, Inc. Method and System for Creating Software Defined Ordered Service Patterns in a Communications Network
CN109635583A (en) * 2018-12-27 2019-04-16 中国电子科技集团公司第三十研究所 A kind of shared exchange method and system of the information security based on data safety label
CN118074939A (en) * 2022-12-02 2024-05-24 广州图灵科技有限公司 A trusted data security isolation method for cloud multi-tenants
CN117155599A (en) * 2023-06-26 2023-12-01 新华三信息安全技术有限公司 Service chain construction method, service access method, related device, equipment and medium
CN117938500A (en) * 2024-01-24 2024-04-26 北京工业大学 Method for realizing trusted cryptography hierarchical encryption service mechanism based on cloud environment

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
YUE ZHAO ET AL.: "A Review of Intelligent Configuration and Its Security for Complex Networks", CHINESE JOURNAL OF ELECTRONICS, vol. 33, no. 4, 22 July 2024 (2024-07-22) *
孙朝伟;: "动态script标签技术结合JSON数据交换格式解决Ajax的跨域问题", 中国新技术新产品, no. 15, 10 November 2008 (2008-11-10) *
钱成功: "基于SRv6的服务链系统设计与实现", 信息科技辑, 15 August 2021 (2021-08-15) *

Also Published As

Publication number Publication date
CN119814280B (en) 2025-05-23

Similar Documents

Publication Publication Date Title
Pohrmen et al. Blockchain‐based security aspects in heterogeneous Internet‐of‐Things networks: a survey
US8108477B2 (en) Message classification using legitimate contact points
US20110029769A1 (en) Method for using trusted, hardware identity credentials in runtime package signature to secure mobile communications and high value transaction execution
CN109688186B (en) Data interaction method, device, equipment and readable storage medium
CN101366238A (en) System and method for improved network-based content inspection
AU2019302938A1 (en) Decentralized automatic phone fraud risk management
CN112422621A (en) Multi-station fusion power data consensus method and device based on PBFT blockchain technology
WO2023019903A1 (en) Cross-chain transaction system and method, and device and storage medium
JP2022120785A (en) Electronic messaging security and authentication
CN111833062B (en) Credibility verification system for digital asset data packet
CN111880919A (en) Data scheduling method, system and computer equipment
US20200220730A1 (en) System and method for authenticating sender(s) of an electronic message transmitted over a telephony network
CN111224782A (en) Data verification method based on digital signature, intelligent device and storage medium
Ram et al. Security and privacy concerns in connected cars: a systematic mapping study
CN112804066A (en) Method and device for transferring message in cross-link mode based on relay equipment
CN119814280B (en) Safety service chain construction method based on data tag
CN114239080B (en) Software multilayer signature method and system based on digital certificate
CN112651044B (en) Business transaction methods, systems and storage media based on blockchain technology
WO2023040453A1 (en) Transaction information processing method and apparatus
CN111917760B (en) Network collaborative manufacturing cross-domain fusion trust management and control method based on identification analysis
Mashima et al. Enhancing demand response signal verification in automated demand response systems
Hadi et al. A vision of blockchain technology and its integration with IOT: Applications, challenges, and opportunities; from the authentication perspective
CN111915325B (en) Method, system and computer readable storage medium for tracing blockchain transaction information
CN102457476A (en) Peer-to-peer network security defense method and system
CN105897713A (en) Method and device for designing inter vehicle communication system security protocol

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant