Method and system for safely controlling network resource

A network resource and security control technology, applied in the transmission system, electrical components, user identity/authority verification, etc., can solve problems such as network resource confusion, and achieve the effects of avoiding network resource confusion, clear hierarchical division, and preventing damage

Active Publication Date: 2013-08-07
ELECTRIC POWER RES INST OF GUANGDONG POWER GRID
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on this, it is necessary to provide a relatively systematic and secure method and system for network resource security control to address the problem of easy confusion of various network resources in trusted network connections

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for safely controlling network resource
  • Method and system for safely controlling network resource
  • Method and system for safely controlling network resource

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Such as figure 1 As shown, a method for network resource security control includes steps:

[0018] Step S110, collect the identity authentication information and integrity information of the access requesting end according to the access request of the access requesting end, and confirm the trust level of the access requesting end; in this embodiment, the system measures the trust level of the access requesting end In this case, IMVs (Integrity Measurement Verifiers, Integrity Measurement Verifiers) can communicate with IMCs (Intergrity Measurement Collectors, Integrity Measurement Collectors) on the access request end to collect the identity authentication information and integrity information of the access request end. Specifically, you can Including: the integrity of the trusted chain, kernel version, system version, kernel patch and signature information of firewall software and other information. The system evaluates the trust level of the access request end throug...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and a system for safely controlling network resource. The method comprises the following steps of: determining creditability grade of an access request end by carrying out creditability grade measurement on a received access request; matching with corresponding access network resource according to different creditability grades; further verifying whether the accessed and required network resource of the access request end matches with the creditability grade of the access request end; if so, agreeing with the access request of the access request end; if not, rejecting the access requirement of the access request end. The network resource is divided by utilizing the creditability grade, and corresponding network resource cannot be accessed if no corresponding grade exists, so that the hierarchical division of the network resource is more clear through the division of the network resource, the system is convenient to control, the network resource and the creditability are further bonded associated together, the confusion of the network resource is prevented, and the damage of incredible access request end to the network is prevented.

Description

technical field [0001] The invention relates to the field of network connection resource security, in particular to a method and system for network resource security control. Background technique [0002] With the advent of the electronic information age, people's confidentiality of information is no longer limited to book records, and the security protection measures for resource information are becoming more and more technological. The research on trusted computing theory has developed rapidly after the establishment of TCG (Trusted Computing Group, Trusted Computing Organization). TCG has successively formulated a series of trusted technical specifications, including TPM (Trusted Platform Module, Trusted Platform Module) platform main specification, TPM interface specification, trusted software stack specification, trusted PC (personal computer, personal computer) specification, Trusted server specifications, trusted PDA (Personal Digital Assistant, personal digital assi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 梁智强梁志宏陈炯聪胡朝辉江泽鑫黄曙余南华苏扬周强峰林丹生
Owner ELECTRIC POWER RES INST OF GUANGDONG POWER GRID
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products