Reference Hub1
Intelligent Information Network Security Management Strategy for Service Innovation of Manufacturing Enterprises Under Blockchain

Intelligent Information Network Security Management Strategy for Service Innovation of Manufacturing Enterprises Under Blockchain

Zhe Zhang, Chengcheng Li
Copyright: © 2022 |Volume: 34 |Issue: 1 |Pages: 17
ISSN: 1546-2234|EISSN: 1546-5012|EISBN13: 9781799893240|DOI: 10.4018/JOEUC.314825
Cite Article Cite Article

MLA

Zhang, Zhe, and Chengcheng Li. "Intelligent Information Network Security Management Strategy for Service Innovation of Manufacturing Enterprises Under Blockchain." JOEUC vol.34, no.1 2022: pp.1-17. http://doi.org/10.4018/JOEUC.314825

APA

Zhang, Z. & Li, C. (2022). Intelligent Information Network Security Management Strategy for Service Innovation of Manufacturing Enterprises Under Blockchain. Journal of Organizational and End User Computing (JOEUC), 34(1), 1-17. http://doi.org/10.4018/JOEUC.314825

Chicago

Zhang, Zhe, and Chengcheng Li. "Intelligent Information Network Security Management Strategy for Service Innovation of Manufacturing Enterprises Under Blockchain," Journal of Organizational and End User Computing (JOEUC) 34, no.1: 1-17. http://doi.org/10.4018/JOEUC.314825

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Since the beginning of the new century, all manufacturing enterprises have been seeking ways to transform and upgrade the systems to maintain their competitive advantages. In the process of transformation and upgrading, service innovation has become more vital. In the service innovation mode, customers and suppliers are mainly involved in the manufacture of products. In the process of communication, these suppliers and customers need to rely on public key infrastructure (PKI) for data encryption and identity authentication operations, thereby achieving reliable information exchange and identity authentication in an untrusted environment. Therefore, ensuring the security of network communication for various types of users is crucial. The purpose of this paper is to solve the problem that results when a tampered certificate is difficult to trace due to the single point of failure and vulnerability of the current settlement and authentication system. In this scenario, the user's identity information is leaked in the certificate application. Resolving this problem is necessary to ensure the security of the information network.