Network space identity management system of three-layer structure

A cyberspace and identity management technology, applied in the transmission system, digital transmission system, data exchange network, etc., can solve the problems of users' trust in cyberspace, threats to personal privacy, unfavorable new technology generation and promotion, etc.

Active Publication Date: 2014-07-09
XINGTANG TELECOMM TECH CO LTD
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Open information sharing in cyberspace increases the risk of personal privacy being threatened, incidents of harm and discrimination caused by the unauthorized disclosure of personally identifiable information and sensitive attr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network space identity management system of three-layer structure
  • Network space identity management system of three-layer structure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are the Some, but not all, embodiments are invented. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0062] Combine below figure 1 The functions of each subsystem and each module of each subsystem in the three-layered cyberspace identity management system of the embodiment of the present invention are described.

[0063] (1) Supporting subsystem: It is mainly used to realize network identity management. The main goal is to establish a reliable process, realize the one...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network space identity management system of a three-layer structure. The network space identity management system comprises a supporting sub-system, a service sub-system and an application sub-system. The supporting sub-system is used for building one-to-one corresponding network identities for main modules, and distributing corresponding identities and/or properties to the built main network identities. The service sub-system is used for managing different evidences through different identity/property providing modules, providing the minimal identity/property assertions for the application sub-system, sending corresponding register commands and/or updating commands and/or logout commands to the supporting sub-system according to main network identity applications, and sending corresponding identities and/or properties to the supporting sub-system according to main identity information. The application sub-system comprises a plurality of main modules and a plurality of relying party modules, and the main modules are used for sending network identity applications and related information to the service sub-system.

Description

technical field [0001] The invention belongs to the field of computer technology and information security, and relates to a network space identity management system with a three-layer structure. Background technique [0002] In cyberspace, people can carry out activities such as community organization, making friends and communicating, electronic transactions, etc., and can also interact in production, learning, and transactions with the help of the Internet. Through cyberspace, people have increased productivity, developed new platforms, and created new places to do business. But with increased online activity, so too have threats in cyberspace. [0003] There is a threat of fraud in cyberspace activities. As people can obtain more and more services online, the total amount of information disseminated in cyberspace has expanded rapidly, and the losses caused by data theft, tampering, fraud, and privacy leaks have continued to increase, and online intrusions have even thre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L9/32H04L29/08
Inventor 张知恒吴江周斌王萌希
Owner XINGTANG TELECOMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products