Trust-theory-based trusted service system based on trusted authentication system

A service system and credible technology, applied in the field of network security service engineering, can solve problems such as difficult to meet the credibility requirements, and achieve the effect of improving security

Inactive Publication Date: 2012-11-28
TIANJIN UNIV
View PDF1 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] It can be seen that any hard security approach that only relies on traditional security technical means and methods, or any soft security approach that relies only on modern credibility assurance technology based on trust theory as the core, is not advisable, and it is difficult to satisfy its all-round security. credibility needs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trust-theory-based trusted service system based on trusted authentication system
  • Trust-theory-based trusted service system based on trusted authentication system
  • Trust-theory-based trusted service system based on trusted authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The specific implementation, structure, features and effects provided by the present invention will be described in detail below in conjunction with the accompanying drawings and preferred embodiments.

[0022] Such as figure 1 Shown is a schematic diagram of the system structure of the trusted service system of the present invention.

[0023] The trusted service platform is divided into four parts, namely, the trusted authentication module based on the combined public key CPK identification authentication, the trust-computable module that meets temporary services and rapid service reorganization, and the intelligence-based Automatic trust negotiation module of proxy technology, service credibility prediction module based on fuzzy non-homogeneous Markov system and multiple regression analysis.

[0024] 1. Service trusted authentication module based on CPK identification authentication in service-oriented computing environment

[0025] Services in a service-oriented co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a trust-theory-based trusted service system based on a trusted authentication system. The system is characterized by comprising four modules, namely a combined public key (CPK) identity authentication-based trusted authentication module, a trusted computing module in line with temporary service and rapid service reconfiguration, an intelligent agent technology-based autonomous trust negotiation module meeting requirements for service dynamics and an automation degree, and a fuzzy non-homogeneous Markov system and multivariate regression analysis-based service trusted prediction module. Compared with the prior art, the system has the advantages that software can be modeled in an early design stage of software development, and an alleviation scheme is made by unified threatening modeling driving software evaluation according to possible threats, so that the security of the software is greatly improved.

Description

technical field [0001] The invention relates to the technical field of network security service engineering; in particular, it relates to a trusted service platform for service computing. Background technique [0002] Service-Oriented Computing (SOC), also referred to as Service Computing, its core idea is to assemble application components distributed on the network into a "service network". Flexible, dynamic business processes and agile applications for organizations and computing platforms. Services under the SOC can support fast, low-cost, interoperable, and scalable widely distributed applications, which can meet the needs of current computer application development, and are also the needs of modern business complexity and dynamic evolution. It is the development direction of software engineering technology and represents the latest development direction of distributed computing and software development. [0003] A service-oriented computing environment typically has ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 田秀明许光全翟敏李晓红孙达志
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products