CN111164948A - 使用区块链网络管理网络安全漏洞 - Google Patents
使用区块链网络管理网络安全漏洞 Download PDFInfo
- Publication number
- CN111164948A CN111164948A CN201980004311.6A CN201980004311A CN111164948A CN 111164948 A CN111164948 A CN 111164948A CN 201980004311 A CN201980004311 A CN 201980004311A CN 111164948 A CN111164948 A CN 111164948A
- Authority
- CN
- China
- Prior art keywords
- vulnerability
- blockchain network
- network
- report
- service
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims abstract description 82
- 238000012795 verification Methods 0.000 claims abstract description 58
- 230000004044 response Effects 0.000 claims description 16
- 230000015654 memory Effects 0.000 claims description 8
- 238000004590 computer program Methods 0.000 abstract description 15
- 230000008569 process Effects 0.000 description 37
- 238000012545 processing Methods 0.000 description 17
- 230000006870 function Effects 0.000 description 13
- 230000009471 action Effects 0.000 description 9
- 238000012360 testing method Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 7
- 238000004458 analytical method Methods 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 230000003993 interaction Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 238000012546 transfer Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 230000035515 penetration Effects 0.000 description 3
- 244000181917 Rubus leucodermis Species 0.000 description 2
- 235000011036 Rubus leucodermis Nutrition 0.000 description 2
- 235000003942 Rubus occidentalis Nutrition 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 230000001105 regulatory effect Effects 0.000 description 2
- 238000013515 script Methods 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 238000004422 calculation algorithm Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000010076 replication Effects 0.000 description 1
- 230000001953 sensory effect Effects 0.000 description 1
- 239000000758 substrate Substances 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims (9)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2019/093365 WO2019170173A2 (en) | 2019-06-27 | 2019-06-27 | Managing cybersecurity vulnerabilities using blockchain networks |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111164948A true CN111164948A (zh) | 2020-05-15 |
CN111164948B CN111164948B (zh) | 2022-05-27 |
Family
ID=67847526
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201980004311.6A Active CN111164948B (zh) | 2019-06-27 | 2019-06-27 | 使用区块链网络管理网络安全漏洞 |
Country Status (5)
Country | Link |
---|---|
US (1) | US11122087B2 (zh) |
EP (1) | EP3669522B1 (zh) |
CN (1) | CN111164948B (zh) |
SG (1) | SG11202001961VA (zh) |
WO (1) | WO2019170173A2 (zh) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111967968A (zh) * | 2020-08-18 | 2020-11-20 | 中国银行股份有限公司 | 基于区块链的漏洞处理方法及装置 |
CN112016095A (zh) * | 2020-08-20 | 2020-12-01 | 上海帆一尚行科技有限公司 | 一种验证漏洞的方法、装置和电子设备 |
CN112019538A (zh) * | 2020-08-26 | 2020-12-01 | 国网山东省电力公司滨州供电公司 | 一种安全设备远程智能告警系统、方法及存储介质 |
CN114095187A (zh) * | 2020-07-30 | 2022-02-25 | 中国移动通信有限公司研究院 | 威胁情报的应用方法及设备 |
CN114095933A (zh) * | 2021-11-18 | 2022-02-25 | 中国银行股份有限公司 | 基于区块链的安全漏洞处理方法及装置 |
CN115529146A (zh) * | 2021-06-25 | 2022-12-27 | 中国移动通信集团设计院有限公司 | 网络安全漏洞处理系统及方法 |
CN116861446A (zh) * | 2023-09-04 | 2023-10-10 | 深圳奥联信息安全技术有限公司 | 一种数据安全的评估方法及系统 |
CN118013583A (zh) * | 2024-02-28 | 2024-05-10 | 中国民用航空飞行学院 | 基于区块链的航空安全自愿报告方法、系统、设备及介质 |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP4062308A1 (en) * | 2019-11-19 | 2022-09-28 | Consensys AG | Network multi-tenant architecture for distributed ledger systems |
US11509677B2 (en) * | 2020-05-05 | 2022-11-22 | Uber Technologies, Inc. | Automatically detecting vulnerability remediations and regressions |
CN111522683B (zh) * | 2020-07-03 | 2020-10-02 | 支付宝(杭州)信息技术有限公司 | 蜜獾拜占庭容错共识机制的共识节点变更方法及相关装置 |
CN112511520A (zh) * | 2020-11-23 | 2021-03-16 | 国网山东省电力公司电力科学研究院 | 一种电力行业网络安全管理系统及方法 |
US12010541B2 (en) * | 2020-12-18 | 2024-06-11 | ThinkRF Corp. | System and method for cryptocurrency incentives in a global distributed crowdsourced spectrum monitoring network |
EP4033725A1 (en) * | 2021-01-22 | 2022-07-27 | Nokia Technologies Oy | Methods and devices for blockchain-based patch management |
CN113536321B (zh) * | 2021-07-16 | 2023-10-20 | 华北电力科学研究院有限责任公司 | 一种漏洞检测方法和装置 |
US20230032836A1 (en) * | 2021-07-30 | 2023-02-02 | Pure Storage, Inc. | Storage System with Blockchain Based Features |
CN114024722A (zh) * | 2021-10-13 | 2022-02-08 | 杭州趣链科技有限公司 | 一种基于区块链的安全检测系统 |
CN116192383B (zh) * | 2023-02-22 | 2023-10-31 | 深圳市怡丰云智科技股份有限公司 | 基于erp加密的物联网监控方法、装置、设备及存储介质 |
CN117034299B (zh) * | 2023-10-09 | 2024-01-26 | 广东时汇信息科技有限公司 | 一种基于区块链的智能合约安全检测系统 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180220278A1 (en) * | 2017-02-01 | 2018-08-02 | BriefTrace Ltd. | System and method for securing and verifying information from transportation monitors |
CN108616539A (zh) * | 2018-05-03 | 2018-10-02 | 东莞市翔实信息科技有限公司 | 一种区块链交易记录访问的方法及系统 |
CN108810006A (zh) * | 2018-06-25 | 2018-11-13 | 百度在线网络技术(北京)有限公司 | 资源访问方法、装置、设备及存储介质 |
CN109639646A (zh) * | 2018-11-16 | 2019-04-16 | 清华大学 | 基于区块链的物联网安全检测方法及系统 |
CN109729068A (zh) * | 2018-11-23 | 2019-05-07 | 北京丁牛科技有限公司 | 基于区块链技术的安全漏洞审计系统 |
Family Cites Families (77)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
BR0215388A (pt) * | 2001-12-31 | 2004-12-07 | Citadel Security Software Inc | Método e sistema para solucionar vulnerabilidades em um computador, e, meio legìvel por computador |
US7664845B2 (en) * | 2002-01-15 | 2010-02-16 | Mcafee, Inc. | System and method for network vulnerability detection and reporting |
US7624422B2 (en) * | 2003-02-14 | 2009-11-24 | Preventsys, Inc. | System and method for security information normalization |
US8984644B2 (en) * | 2003-07-01 | 2015-03-17 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US7475427B2 (en) * | 2003-12-12 | 2009-01-06 | International Business Machines Corporation | Apparatus, methods and computer programs for identifying or managing vulnerabilities within a data processing network |
US7634813B2 (en) * | 2004-07-21 | 2009-12-15 | Microsoft Corporation | Self-certifying alert |
US7774848B2 (en) * | 2004-07-23 | 2010-08-10 | Fortinet, Inc. | Mapping remediation to plurality of vulnerabilities |
US20060075503A1 (en) * | 2004-09-13 | 2006-04-06 | Achilles Guard, Inc. Dba Critical Watch | Method and system for applying security vulnerability management process to an organization |
US20060164199A1 (en) | 2005-01-26 | 2006-07-27 | Lockdown Networks, Inc. | Network appliance for securely quarantining a node on a network |
US8239493B2 (en) | 2009-04-21 | 2012-08-07 | International Business Machines Corporation | Automated server controlled client-side logging |
US10027711B2 (en) * | 2009-11-20 | 2018-07-17 | Alert Enterprise, Inc. | Situational intelligence |
US8590047B2 (en) * | 2011-01-04 | 2013-11-19 | Bank Of America Corporation | System and method for management of vulnerability assessment |
US10789373B2 (en) * | 2011-10-31 | 2020-09-29 | Reid Consulting Group, Inc. | System and method for securely storing and sharing information |
EP3617987B1 (en) * | 2013-03-15 | 2021-10-06 | Socure Inc. | Risk assessment using social networking data |
US9246935B2 (en) * | 2013-10-14 | 2016-01-26 | Intuit Inc. | Method and system for dynamic and comprehensive vulnerability management |
US10832310B2 (en) * | 2014-03-31 | 2020-11-10 | Monticello Enterprises LLC | System and method for providing a search entity-based payment process |
US9413780B1 (en) * | 2014-05-06 | 2016-08-09 | Synack, Inc. | Security assessment incentive method for promoting discovery of computer software vulnerabilities |
US9015847B1 (en) * | 2014-05-06 | 2015-04-21 | Synack, Inc. | Computer system for distributed discovery of vulnerabilities in applications |
US9824222B1 (en) * | 2014-05-06 | 2017-11-21 | Synack, Inc. | Method of distributed discovery of vulnerabilities in applications |
US9967334B2 (en) * | 2015-03-02 | 2018-05-08 | Dell Products Lp | Computing device configuration and management using a secure decentralized transaction ledger |
US10095878B2 (en) * | 2015-06-02 | 2018-10-09 | ALTR Solutions, Inc. | Internal controls engine and reporting of events generated by a network or associated applications |
US10628764B1 (en) * | 2015-09-15 | 2020-04-21 | Synack, Inc. | Method of automatically generating tasks using control computer |
US9531745B1 (en) * | 2015-11-20 | 2016-12-27 | International Business Machines Corporation | Crowd-sourced security analysis |
US20170178127A1 (en) | 2015-12-18 | 2017-06-22 | International Business Machines Corporation | Proxy system mediated legacy transactions using multi-tenant transaction database |
EP3437002A4 (en) | 2016-03-31 | 2019-08-21 | Clause, Inc. | SYSTEM AND METHOD FOR CREATING AND EXECUTING LEGAL CONTRACTS PILOTED BY DATA |
US10046228B2 (en) * | 2016-05-02 | 2018-08-14 | Bao Tran | Smart device |
US10022613B2 (en) | 2016-05-02 | 2018-07-17 | Bao Tran | Smart device |
US11112784B2 (en) * | 2016-05-09 | 2021-09-07 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for communications in an industrial internet of things data collection environment with large data sets |
US10489278B2 (en) * | 2016-05-16 | 2019-11-26 | Jpmorgan Chase Bank, N.A. | Method and system for implementing an automation software testing and packaging framework with entitlements |
CA2968710A1 (en) * | 2016-05-31 | 2017-11-30 | Valarie Ann Findlay | Security threat information gathering and incident reporting systems and methods |
US9660870B1 (en) * | 2016-06-08 | 2017-05-23 | Synack, Inc. | Systems and methods of soft patching security vulnerabilities |
US10510031B2 (en) * | 2016-06-10 | 2019-12-17 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US10108954B2 (en) | 2016-06-24 | 2018-10-23 | PokitDok, Inc. | System and method for cryptographically verified data driven contracts |
US10679267B2 (en) * | 2016-08-03 | 2020-06-09 | Raise Marketplace, Llc | Method and system for consumption based redemption in an exchange item marketplace network |
CN106372514A (zh) * | 2016-08-30 | 2017-02-01 | 东软集团股份有限公司 | 一种安全漏洞维护方法及系统 |
US10445709B2 (en) | 2016-09-28 | 2019-10-15 | The Toronto-Dominion Bank | Real time virtual draft system and method |
US20180108089A1 (en) | 2016-10-14 | 2018-04-19 | International Business Machines Corporation | Transactions and linked assets on a blockchain |
US11176519B2 (en) | 2016-11-11 | 2021-11-16 | International Business Machines Corporation | Smart contract admission check and fault tolerance in a blockchain |
CA3049684A1 (en) | 2017-01-27 | 2018-08-02 | Walmart Apollo, Llc | Managing smart appliances using blockchain technology |
US10375105B2 (en) | 2017-03-03 | 2019-08-06 | International Business Machines Corporation | Blockchain web browser interface |
US20180315145A1 (en) | 2017-05-01 | 2018-11-01 | International Business Machines Corporation | Managing school systems on a blockchain |
CN107169765B (zh) | 2017-05-11 | 2020-07-31 | 电子科技大学 | 一种基于业务信任度对区块链共识进行动态调整的方法 |
US10944546B2 (en) | 2017-07-07 | 2021-03-09 | Microsoft Technology Licensing, Llc | Blockchain object interface |
WO2019068027A1 (en) | 2017-09-29 | 2019-04-04 | PokitDok, Inc. | SYSTEM AND METHOD FOR CRYPTOGRAPHIC ACTIVE BLOCK CHAIN |
US10735203B2 (en) | 2017-10-09 | 2020-08-04 | Cisco Technology, Inc. | Sharing network security threat information using a blockchain network |
US10963400B2 (en) | 2017-10-11 | 2021-03-30 | International Business Machines Corporation | Smart contract creation and monitoring for event identification in a blockchain |
US11063744B2 (en) | 2017-10-20 | 2021-07-13 | Sap Se | Document flow tracking using blockchain |
WO2019089646A1 (en) | 2017-10-30 | 2019-05-09 | Pricewaterhousecoopers Llp | System and method for validation of distributed data storage systems |
US11520880B2 (en) * | 2017-11-03 | 2022-12-06 | International Business Machines Corporation | Identifying internet of things network anomalies using group attestation |
US10659473B2 (en) * | 2017-11-09 | 2020-05-19 | Nokia Solutions And Networks Oy | Method and apparatus for blockchain powered integrity protection system |
US10534923B2 (en) | 2017-11-14 | 2020-01-14 | Wipro Limited | System and method for tracking and managing additive manufacturing of components |
US20190188804A1 (en) | 2017-12-18 | 2019-06-20 | Social Media Compliance Ltd | Platform for automated social media regulatory compliance monitoring |
US11431740B2 (en) * | 2018-01-02 | 2022-08-30 | Criterion Systems, Inc. | Methods and systems for providing an integrated assessment of risk management and maturity for an organizational cybersecurity/privacy program |
US11121872B2 (en) * | 2018-01-23 | 2021-09-14 | Zeronorth, Inc. | Trusted verification of cybersecurity remediation |
US20190251199A1 (en) | 2018-02-14 | 2019-08-15 | Ivan Klianev | Transactions Across Blockchain Networks |
CN108573341B (zh) | 2018-03-23 | 2021-09-14 | 杭州云象网络技术有限公司 | 一种基于联盟链的工作流系统构建方法 |
US11700132B2 (en) * | 2018-05-02 | 2023-07-11 | Cable Television Laboratories, Inc. | Systems and methods for secure event and log management |
US10747201B2 (en) | 2018-05-02 | 2020-08-18 | Rockwell Automation Technologies, Inc. | Subscription-based services using industrial blockchains |
CN108965247A (zh) * | 2018-06-04 | 2018-12-07 | 上海交通大学 | 一种基于区块链的威胁情报交换共享系统和方法 |
CN108898021B (zh) * | 2018-06-04 | 2021-06-01 | 北京奇虎科技有限公司 | 基于区块链的威胁情报处理方法、系统及计算设备 |
US10581805B2 (en) * | 2018-06-08 | 2020-03-03 | Gcp Ip Holdings I, Llc | Blockchain overwatch |
US10673618B2 (en) * | 2018-06-08 | 2020-06-02 | Cisco Technology, Inc. | Provisioning network resources in a wireless network using a native blockchain platform |
CN109034833B (zh) | 2018-06-16 | 2021-07-23 | 复旦大学 | 一种基于区块链的产品追溯信息管理系统及方法 |
US20190384842A1 (en) | 2018-06-19 | 2019-12-19 | Toyota Motor Engineering & Manufacturing North America, Inc. | Systems, methods and data structures for workflow blockchains |
US10979445B2 (en) * | 2018-07-09 | 2021-04-13 | At&T Intellectual Property I, L.P. | Security management of devices using blockchain technology |
US20200028691A1 (en) | 2018-07-20 | 2020-01-23 | Honeywell International Inc. | System and method for a blockchain based automated certifiable workflow process |
US20200053117A1 (en) * | 2018-08-07 | 2020-02-13 | Telesis Corporation | Method, system, and/or software for finding and addressing an information/data or related system's security risk, threat, vulnerability, or similar event, in a computing device or system |
US11245576B2 (en) * | 2018-09-07 | 2022-02-08 | Dell Products L.P. | Blockchain-based configuration profile provisioning system |
US10382473B1 (en) * | 2018-09-12 | 2019-08-13 | Xm Cyber Ltd. | Systems and methods for determining optimal remediation recommendations in penetration testing |
US11769573B2 (en) | 2018-10-16 | 2023-09-26 | Netspective Communications Llc | Team-based tele-diagnostics blockchain-enabled system |
US10958419B2 (en) * | 2018-10-22 | 2021-03-23 | Motorola Solutions, Inc. | Method to establish distributed ledger networks with multiple access levels for an incident |
US11190520B2 (en) * | 2018-11-20 | 2021-11-30 | Microsoft Technology Licensing, Llc | Blockchain smart contracts for digital asset access |
CN109639464A (zh) | 2018-11-23 | 2019-04-16 | 武汉烽火技术服务有限公司 | 基于web界面的idc网络巡检方法及系统 |
CN109544192A (zh) | 2018-11-29 | 2019-03-29 | 黄秋红 | 一种基于区块链技术的藏品防伪溯源方法 |
CN109767190A (zh) | 2018-12-29 | 2019-05-17 | 中国工商银行股份有限公司 | 基于区块链的跨机构工作流处理方法、平台及系统 |
US11265348B2 (en) * | 2019-01-14 | 2022-03-01 | International Business Machines Corporation | Ongoing and on-demand secure verification of audit compliance |
US11372980B2 (en) * | 2019-06-14 | 2022-06-28 | Netiq Corporation | Blockchains for software component vulnerability databases |
-
2019
- 2019-06-27 WO PCT/CN2019/093365 patent/WO2019170173A2/en unknown
- 2019-06-27 CN CN201980004311.6A patent/CN111164948B/zh active Active
- 2019-06-27 SG SG11202001961VA patent/SG11202001961VA/en unknown
- 2019-06-27 EP EP19763410.8A patent/EP3669522B1/en active Active
- 2019-12-12 US US16/712,340 patent/US11122087B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180220278A1 (en) * | 2017-02-01 | 2018-08-02 | BriefTrace Ltd. | System and method for securing and verifying information from transportation monitors |
CN108616539A (zh) * | 2018-05-03 | 2018-10-02 | 东莞市翔实信息科技有限公司 | 一种区块链交易记录访问的方法及系统 |
CN108810006A (zh) * | 2018-06-25 | 2018-11-13 | 百度在线网络技术(北京)有限公司 | 资源访问方法、装置、设备及存储介质 |
CN109639646A (zh) * | 2018-11-16 | 2019-04-16 | 清华大学 | 基于区块链的物联网安全检测方法及系统 |
CN109729068A (zh) * | 2018-11-23 | 2019-05-07 | 北京丁牛科技有限公司 | 基于区块链技术的安全漏洞审计系统 |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114095187B (zh) * | 2020-07-30 | 2023-05-09 | 中国移动通信有限公司研究院 | 威胁情报的应用方法、设备及计算机可读存储介质 |
CN114095187A (zh) * | 2020-07-30 | 2022-02-25 | 中国移动通信有限公司研究院 | 威胁情报的应用方法及设备 |
CN111967968A (zh) * | 2020-08-18 | 2020-11-20 | 中国银行股份有限公司 | 基于区块链的漏洞处理方法及装置 |
CN111967968B (zh) * | 2020-08-18 | 2023-10-24 | 中国银行股份有限公司 | 基于区块链的漏洞处理方法及装置 |
CN112016095A (zh) * | 2020-08-20 | 2020-12-01 | 上海帆一尚行科技有限公司 | 一种验证漏洞的方法、装置和电子设备 |
CN112016095B (zh) * | 2020-08-20 | 2024-01-12 | 上海帆一尚行科技有限公司 | 一种验证漏洞的方法、装置和电子设备 |
CN112019538A (zh) * | 2020-08-26 | 2020-12-01 | 国网山东省电力公司滨州供电公司 | 一种安全设备远程智能告警系统、方法及存储介质 |
CN112019538B (zh) * | 2020-08-26 | 2023-05-26 | 国网山东省电力公司滨州供电公司 | 一种安全设备远程智能告警系统、方法及存储介质 |
CN115529146A (zh) * | 2021-06-25 | 2022-12-27 | 中国移动通信集团设计院有限公司 | 网络安全漏洞处理系统及方法 |
CN115529146B (zh) * | 2021-06-25 | 2024-10-29 | 中国移动通信集团设计院有限公司 | 网络安全漏洞处理系统及方法 |
CN114095933A (zh) * | 2021-11-18 | 2022-02-25 | 中国银行股份有限公司 | 基于区块链的安全漏洞处理方法及装置 |
CN116861446A (zh) * | 2023-09-04 | 2023-10-10 | 深圳奥联信息安全技术有限公司 | 一种数据安全的评估方法及系统 |
CN118013583A (zh) * | 2024-02-28 | 2024-05-10 | 中国民用航空飞行学院 | 基于区块链的航空安全自愿报告方法、系统、设备及介质 |
Also Published As
Publication number | Publication date |
---|---|
CN111164948B (zh) | 2022-05-27 |
US11122087B2 (en) | 2021-09-14 |
US20200412766A1 (en) | 2020-12-31 |
SG11202001961VA (en) | 2020-04-29 |
EP3669522B1 (en) | 2021-11-24 |
WO2019170173A3 (en) | 2020-04-23 |
EP3669522A2 (en) | 2020-06-24 |
WO2019170173A2 (en) | 2019-09-12 |
EP3669522A4 (en) | 2020-08-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111164948B (zh) | 使用区块链网络管理网络安全漏洞 | |
JP6869374B2 (ja) | トラステッド実行環境のための分散型鍵管理 | |
KR102227685B1 (ko) | 블록 체인 네트워크에서 민감 데이터 요소를 관리하는 방법 | |
JP7426475B2 (ja) | 分散化されたデータ認証 | |
US10230756B2 (en) | Resisting replay attacks efficiently in a permissioned and privacy-preserving blockchain network | |
JP2020528224A (ja) | 信頼できる実行環境におけるスマート契約動作のセキュアな実行 | |
JP2020527259A (ja) | 高可用な高信頼実行環境を使用したブロックチェーンネットワークのためのパブリックデータの読み出し | |
US11641364B2 (en) | Cross-domain state synchronization | |
JP7511629B2 (ja) | ブロックチェーンを構成するためのセキュリティ層 | |
Kumar et al. | Exploring security issues and solutions in cloud computing services–a survey | |
CN111066019A (zh) | 处理存储在区块链网络中的数据元素 | |
Wale Amol et al. | Data integrity auditing of cloud storage | |
Soltys | Cybersecurity in the AWS Cloud | |
KR102148452B1 (ko) | 블록체인 기술을 이용한 국군 여가문화 컨텐츠 전용 보안 시스템 및 그 구동방법 | |
Lim et al. | AuthChain: a decentralized blockchain-based authentication system | |
US12126716B2 (en) | Anonymous private shared partitions in a global total order broadcast domain networks using random symmetric encryption keys | |
Yoshida et al. | Understanding the origins of weak cryptographic algorithms used for signing android apps | |
US20240372697A1 (en) | Multi-Party Computation Node Configuration | |
Abinaya et al. | Cloud-based TPA auditing with risk prevention | |
Mendoza Jiménez | Securing a REST API Server | |
WO2024228951A1 (en) | Key ceremony and configuration in multi-party computation | |
Uddholm | Anonymous Javascript Cryptography and CoverTraffic in Whistleblowing Applications | |
Jaiswal | Analyzing and addressing the security issues of non-browser web-connected applications | |
Ugale Santosh | Survey paper on integrity auditing of storage | |
Carter | An examination of the growing enterprise threat associated with compromised keys and certificates with recommendations for changes to control objectives for information and related technology standards |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20201012 Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Applicant after: Innovative advanced technology Co.,Ltd. Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Applicant before: Advanced innovation technology Co.,Ltd. Effective date of registration: 20201012 Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Applicant after: Advanced innovation technology Co.,Ltd. Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands Applicant before: Alibaba Group Holding Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20240919 Address after: Guohao Times City # 20-01, 128 Meizhi Road, Singapore Patentee after: Ant Chain Technology Co.,Ltd. Country or region after: Singapore Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Patentee before: Innovative advanced technology Co.,Ltd. Country or region before: Cayman Islands |