Unlock instant, AI-driven research and patent intelligence for your innovation.

Automatic trust establishing method for resource security protection and system thereof

A resource security and establishment method technology, which is applied in the field of automatic trust establishment of resource security protection, can solve the problems of increasing the complexity of tree search and matching algorithm design, lack of original policy structure maintenance, and complicated trust establishment process, etc., to achieve fast establishment, The effect of simple structure and reduced redundancy

Inactive Publication Date: 2012-09-19
BEIHANG UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] (2) The negotiation tree decomposes the nodes whose semantics is policy into trust certificate nodes, lacks the maintenance of the original policy structure, and increases the complexity of tree search and matching algorithm design, the process of trust establishment is complicated, and the efficiency of trust establishment is low
[0009] (3) In terms of the construction of the negotiated trust certificate, many assumptions lack the construction of the trust certificate chain, and the trust certificate often does not directly have a trust relationship

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic trust establishing method for resource security protection and system thereof
  • Automatic trust establishing method for resource security protection and system thereof
  • Automatic trust establishing method for resource security protection and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0053] In order to have a better understanding of the technical solutions of the embodiments of the present invention, the relevant terms and definitions involved therein will be described below.

[0054] (1) Attribute trust certificate.

[0055] Refers to the assertion of another subject's identity and related attributes by a subject through att...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an automatic trust establishing method for resource security protection and a system thereof. The method comprises the following steps: analyzing received massages on coordination information of both main bodies requiring trust establishment so as to separate security strategies and credentials; constructing a hybrid coordination tree model representing the set relationship of the security strategies and the credentials of both main bodies requiring trust establishment according to the separated security strategies and credentials, and maintaining the session state of both main bodies requiring trust establishment based on the hybrid coordination tree model; obtaining a disclosure policy for configuration of credentials and security strategies according to the constructed hybrid coordination tree model, and based on the disclosure policy, establishing credentials for both main bodies requiring trust to disclose to each other, constructing a credential chain, and establishing trust between both main bodies. The technical scheme of the invention can be used for rapidly and effectively establishing the credential chain between both main bodies, so as to establish trust between both main bodies. Moreover, the efficiency of trust establishment is high.

Description

technical field [0001] The embodiments of the present invention relate to the field of network technologies, and in particular to a method and system for automatically establishing trust for resource security protection. Background technique [0002] At present, the development of the Internet has had a major impact on the transformation of the computing environment and application models of software systems. Many new network computing models such as Virtual Computing, Pervasive Computing, and Cloud Computing have come into operation. It provides users with more simple and transparent ways to dynamically obtain large-scale computing and storage services, and effectively promotes the effective sharing and comprehensive utilization of resources on the Internet. [0003] At the same time, as technologies such as Service Oriented Architecture (Service Oriented Architecture, SOA) and Software as a Service (SaaS) become increasingly mature, the application mode of software systems...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/56
Inventor 李建欣李先贤孟琳琳刘旭东
Owner BEIHANG UNIV