Supercharge Your Innovation With Domain-Expert AI Agents!

Network resource access control method in reliable access

A technology for access control and network resources, applied in the field of network communication

Inactive Publication Date: 2009-03-11
SOUTHEAST UNIV
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention proposes a network resource access control method in trusted access in order to solve the problems of storage and verification calculation overheads in the existing trusted access control technology in large-scale networking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network resource access control method in reliable access
  • Network resource access control method in reliable access
  • Network resource access control method in reliable access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Such as figure 1 As shown in the network resource access control model diagram, the trusted access server is the security center of the entire system, and is also a network entity trusted by resource owners and terminals, responsible for the management and distribution of security materials.

[0031] To implement this method, a security association must be established between the trusted access server, the resource owner and the terminal, and the trusted access server distributes key materials to the resource owner and the terminal under the protection of the security association. The trusted access server assigns a key material to each resource owner, and temporarily generates an access token for the terminal to access the corresponding resource according to the credibility of the terminal. Only terminals holding valid tokens can access specific resources.

[0032] The invention proposes a network resource access control method in trusted access, the main steps of whic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an access control method of network resources in trusted access, which belongs to the field of network communication. The method comprises the following steps: a trusted access server carries out system initialization, key document distribution and resource access control; wherein the system initialization of the trusted access server comprises the steps of using an SEA algorithm to establish elliptic curves randomly and selecting a point G as a first base point on the elliptic curves randomly; the key document distribution comprises the steps of key distribution of resource owners st and key distribution of terminal mt'; the resource access control comprises the steps of using a private key kt'->t to carry out signing to request information when a terminal mt' accesses a resource owner st and using a public key Gx#-t and a second base point Gm#-t'->t to carry out checking to the terminal mt' when the resource owner st receives the request information. Only passing the checking, the terminal mt' can be proved to own the private key kt'->t, thereby being the terminal authorized by the trusted access server. The invention can effectively reduce the space occupied by the resource owner for storing the terminal information and reduce the expenditure of the checking calculation simultaneously.

Description

technical field [0001] The invention relates to a network resource access control method, in particular to a network resource access control method in trusted access, belonging to the field of network communication. Background technique [0002] In recent years, with the popularization of various access technologies, the number of Internet users has also shown an explosive growth trend. According to the statistics of the Internet Society of China, by the end of 2006, the number of Internet users in my country had reached 130 million, with an annual growth rate of 30%. The increase in the number of network users has also greatly increased the possibility of network security attacks. Network hackers can easily spread viruses through computer networks, steal credit card accounts, and use network security loopholes to obtain commercial benefits, which has brought a lot of Cybercriminal activity. According to the data released by my country's public security organs, in 2005, my ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 万长胜胡爱群
Owner SOUTHEAST UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More