Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multiple-mobile-agent credible interaction method for information acquisition system in open network

A technology of mobile subject and interaction method, applied in the field of trusted interaction, to achieve the effect of ensuring effectiveness

Inactive Publication Date: 2010-03-17
NANJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Technical problem: The purpose of the present invention is to solve various security problems existing in the construction of application systems such as information acquisition based on multi-mobile subject technology in open network environments such as grid computing, peer-to-peer computing, or cloud computing, thereby providing a Multi-mobile agent trusted interaction method based on open network information acquisition system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multiple-mobile-agent credible interaction method for information acquisition system in open network
  • Multiple-mobile-agent credible interaction method for information acquisition system in open network
  • Multiple-mobile-agent credible interaction method for information acquisition system in open network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The flow of the multi-mobile subject trusted interaction method is as follows:

[0057] Step 1. The sender and receiver of the subject first confirm the legal identities of both parties, verify the network addresses of both parties, and assign the execution sequence number of this information exchange to both parties;

[0058] Step 2. The local subject submits the information to the network patrol subject / data transfer subject, signs the network patrol subject / data transfer subject, and encrypts the private data therein;

[0059] Step 3. Send the signed and encrypted network inspection subject / data transfer subject to the receiver host through an encrypted channel based on the secure socket layer, and the receiving module of the receiver receives it and sends it to the multi-mobile subject trusted interaction method for further processing. Security check;

[0060] Step 4. The receiver integrity checking module verifies the integrity of the network inspection subject / da...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a credible interaction method used for ensuring the operational safe reliability of a system in an open network computing environment, such as grid computing, peer-to-peer computing, cloud computing and the like, when the multiple-mobile-agent technology is used for constructing corresponding network application systems, such as information acquisition systems and the like. From the angle of the application of the information acquisition in open networks, aiming at the safety problems in the information acquisition systems based on multiple mobile agents in an open network computing environment, the invention provides a credible interaction method as well as a solution. The specification firstly introduces the architecture and the working principle of the information acquisition system based on multiple mobile agents, deeply analyzes the safety problems of the system, designs the structure of the multiple-mobile-agent credible interaction method, and provides the specific working procedure of the multiple-mobile-agent credible interaction method. The multiple-mobile-agent credible interaction method solves the safety problems and has reference value for other application systems based on multiple mobile agents.

Description

technical field [0001] The present invention is an open network computing environment such as grid computing, peer-to-peer computing, cloud computing, etc., in order to ensure the safety and reliability of system operation when using multi-mobile subject technology to construct corresponding network application systems such as information acquisition. , a trusted interaction method that can be adopted. The technology belongs to the cross-technical application field of computer network, computer software and information security. Background technique [0002] With the rapid development of network technologies such as the Internet, various network applications are becoming more and more popular. Open network computing environments such as grid computing, peer-to-peer computing or cloud computing provide people with massive information resources. People need efficient network and computer systems to help people search for information, obtain information, filter information, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L9/00
Inventor 徐小龙王汝传孙力娟陈丹伟熊婧夷梅哲滔高翔窦孝晨
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products