Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing credible and controllable network protocol

A network protocol and reliable technology, applied in electrical components, transmission systems, etc., can solve problems such as difficult to predict the execution process and results of network interaction, lack of trust mechanism research, lack of theoretical model support, etc., to achieve convenient and efficient direct network protocol control Effect

Inactive Publication Date: 2010-08-11
SOUTHEAST UNIV
View PDF1 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

First, from the research on trusted network connection, although the current research on trusted network connection has achieved important results, these achievements have played an important role in the development of information system security, but due to the And practice is still in the development stage, and there are still problems such as research still at the level of engineering technology, lack of theoretical model support, and incomplete system structure. The most notable aspect is that most of the existing research focuses on the trust mechanism itself, lacking trust The research on the control mechanism on which the mechanism depends cannot implement management and control on the interactive behavior of entities, so it is difficult to predict the execution process and results of network interaction
Second, from the research of trusted protocols, although trusted protocols emphasize the need to be controllable beyond trusted mechanisms, network trusted control has not been well resolved; trusted protocols focus on trying to build malicious The control method that the behavior has not yet worked or the result of the damage has not been discovered, but when the deception has worked or the result of the damage has been denied, the trusted protocol still lacks a corresponding post-event audit mechanism to punish the malicious behavior in the implementation of the agreement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing credible and controllable network protocol
  • Method for realizing credible and controllable network protocol
  • Method for realizing credible and controllable network protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0052] Implementation example: a trusted and controllable network protocol structure such as figure 1 As shown, it is not to overthrow the existing OSI seven-layer system and any network protocol structure in the TCP / IP four-layer system to rebuild a new type of network protocol structure, but to add a credible and controllable four-layer protocol structure on this basis. Layer logic structure, which includes four layers of "trust decision-making layer", "trust observation layer", "trust resource layer" and "trust interaction layer", in which the trust interaction layer realizes the existing network protocol in a trusted unified shared platform mode Interaction with the trust resource layer. The trust resource layer will obtain time-series-based user behavior, network protocol status, and network protocol resources through the interaction layer mechanism. Historical reliability is provided to the trust observation layer in the form of "trust flow". The trust observation layer ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for realizing credible and controllable network protocol. The method is as follows: a credibility decision layer, a credibility observation layer, a credibility resource layer and a credibility interaction layer are provided, wherein the credibility interaction layer realizes the interaction between the existing network protocol and the credibility resource layer, the credibility resource layer provides credibility flow to the credibility observation layer, and the credibility observation layer picks up characteristics from the credibility flow to provide a credibility view with good consistency and observability to the credibility decision layer; according to the observable credibility view, the credibility observation layer puts forward a control proposal which is supplied to the existing network protocol through the credibility interaction layer to reach control purpose; and at the same time, the credibility of all the protocol elements at that time is presented and supplied to the credibility observation layer in the form of historical credibility flow through the credibility interaction layer. Under the support of the four layers, the method enables the network protocol to be a closed self-feedback system in the whole processes from monitoring, detecting and analyzing to decision-making and control and satisfies the requirement of controllability over the predictability and the manageability of the implementation of the network protocol and the user action.

Description

technical field [0001] The present invention relates to the field of network security and network management, specifically a method for realizing a trusted and controllable network protocol, which is used to realize predictable and manageable network protocol execution and protocol entity behavior, as follows A generation of trusted and controllable network protocols provides the infrastructure. Background technique [0002] Network protocol is the basic point and specification of network interaction between entities of the same layer. At present, the industry does not have a unified opinion on the structure used to ensure the security of network interaction in the Internet, and is not even sure about the main means to ensure the security of network interaction. As far as the current public research is concerned, the current research on the security and credibility of network interaction can be divided into two parts: network interaction based on hard security mechanism and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 罗军舟韩志耕蒋健李伟杨明刘波
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products