Research Article
Based on the Role of Internet of Things Security in the Management of Enterprise Human Resource Information Leakage
Table 1
Node identity and startup configuration file.
| Equipment | Node identity | Website address | Configuration file |
| Laptop | Client,Node1(Org1) | 192.16.10.119 | Channel profile | Industrial PC1 | OrdererOrg,master | 192.16.10.239 | Channel profile | Industrial PC2 | Node0(Org2) | 192.16.10.64 | Channel profile | Industrial PC3 | Node0(Org1) | 192.16.10.72 | Channel profile | Data collector | Node1(Org2) | 192.16.10.46 | Channel profile |
|
|