Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Threat information exchange sharing method based on block chain

A blockchain and intelligence technology, applied in transmission systems, instruments, finance, etc., can solve the lack of unified and automated evaluation standards for intelligence supply capabilities, feedback capabilities, and emergency response capabilities, threat intelligence coverage, timeliness, and accuracy. Lack of problems such as lack of threat intelligence assessment effect quantification standards, etc., to achieve the effect of promoting effective utilization and automated transactions, improving automation and objectivity, and promoting effective consumption and high-value utilization

Inactive Publication Date: 2019-07-05
INST OF INFORMATION ENG CAS
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Open source threat intelligence provides a large amount of effective intelligence for public welfare and other purposes, but the coverage, timeliness, accuracy, etc. Provided by producers, there is still a lack of unified and automated evaluation standards in terms of intelligence supply capabilities, feedback capabilities, and emergency response capabilities, which brings threat intelligence consumers the problem of lack of quantitative standards for threat intelligence evaluation effects

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threat information exchange sharing method based on block chain
  • Threat information exchange sharing method based on block chain
  • Threat information exchange sharing method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the purpose, features and advantages of the present invention more obvious and easy to understand, the technical core of the present invention will be further described in detail below in conjunction with the accompanying drawings and examples instruction of.

[0021] In the present invention, a method for exchanging and sharing threat information based on blockchain is proposed.

[0022] Such as figure 1 Shown is the overall framework diagram of this method. There are six steps:

[0023] Step 1. Construct threat intelligence blockchain nodes. In order to solve the problem of low mining efficiency and resource consumption of PoW, the present invention combines the behavior of users of the threat intelligence blockchain system to access the threat intelligence blockchain system (it can be understood that the useful contribut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a threat information exchange sharing method based on a block chain, and the method comprises the steps: 1),a threat information block chain system is set with the system comprising comprises a threat information block chain, a synchronization node, and a plurality of maintenance nodes; a user registers as a threat information block chain user, and obtains a corresponding public key and a corresponding private key; 2) a threat information producer sets intelligent contract content on the system, signs the intelligent contract content with a private key and then issues the intelligent contract content to a threat information block chain; 3) the intelligent contract content signed issued by the information consumer synchronously is threatened, a private key used to sign and the content is broadcast through the system; 4) a maintenance node analyzes the content in the smart contract and packages the content into a new threat information block A; 5) a block A is broadcasted to the system, the maintenance node adds the block A to the threat information block chain after consensus of the block A is achieved, and 6) the maintenance node achieves consensus after confirming the effectiveness of the smart contract, creates a new block B and broadcasts a new block B through the system.

Description

technical field [0001] The invention discloses a method for exchanging and sharing threat information based on block chain, which realizes the confidence, timeliness, matching degree and correlation degree of threat information by using the decentralization mechanism, consensus algorithm and non-tamperable modification of block chain The controllability of key indicators, such as key indicators, has changed the traditional mode of threat intelligence exchange and sharing through the token incentive mechanism, which has greatly promoted the quantity, quality and enthusiasm of threat intelligence producers to supply intelligence, and also greatly promoted the threat intelligence. Efficient consumption and high value utilization. Background technique [0002] The existing threat intelligence exchange and sharing models mainly include open source threat intelligence exchange and sharing and commercial threat intelligence exchange and sharing. Open source threat intelligence pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32G06Q40/04
CPCG06Q40/04H04L9/3247H04L63/0442H04L63/123
Inventor 宋秉华姜政伟杜翔宇江钧杨沛安刘宝旭
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products