Trust-theory-based trusted service system based on trusted authentication system
A service system and credible technology, applied in the field of network security service engineering, can solve problems such as difficult to meet the credibility requirements, and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021] The specific implementation, structure, features and effects provided by the present invention will be described in detail below in conjunction with the accompanying drawings and preferred embodiments.
[0022] Such as figure 1 Shown is a schematic diagram of the system structure of the trusted service system of the present invention.
[0023] The trusted service platform is divided into four parts, namely, the trusted authentication module based on the combined public key CPK identification authentication, the trust-computable module that meets temporary services and rapid service reorganization, and the intelligence-based Automatic trust negotiation module of proxy technology, service credibility prediction module based on fuzzy non-homogeneous Markov system and multiple regression analysis.
[0024] 1. Service trusted authentication module based on CPK identification authentication in service-oriented computing environment
[0025] Services in a service-oriented co...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com