Behavior prediction control based trusted network group construction method

A technology of predictive control and construction methods, applied in digital data protection, instruments, electrical digital data processing, etc., can solve the problems of lack of judgment methods, lack of precise definition of entity credible behavior, and failure to consider similar characteristics

Active Publication Date: 2015-11-04
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. Lack of precise definition of trusted behavior of entities in the network;
[0006] 2. The research on entities in the network focuses on individual research, and does not take into account

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Behavior prediction control based trusted network group construction method
  • Behavior prediction control based trusted network group construction method
  • Behavior prediction control based trusted network group construction method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0029] The present invention proposes a user behavior measurement method based on generalized control prediction. The credible terminal in the network should be considered in the group where the terminal is located, and a credible group composed of credible terminals is constructed according to the community construction idea in sociology. Model, and then constrain the behavior of a single entity in the network through the trusted group, and finally achieve the credibility of the terminal and the trustworthiness of the network group where the terminal is located.

[0030] From a sociological point of view, a group is relative to an individual, but not any few people can form a group. A group ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a behavior prediction control based trusted network group construction method, comprising the steps of: step 10, performing identity measurement on a user terminal, and rejecting access of the user terminal who cannot pass the identity measurement; step 20, performing state measurement on the user terminal passing the identity measurement, and rejecting access of the user terminal who cannot pass the state measurement; and step 30, performing behavior measurement on the user terminal passing the state measurement, and rejecting access of the user terminal who cannot pass the behavior measurement. According to the method, in a trusted group construction process, firstly whether a behavioral individual is trusted is evaluated by predicting whether individual behaviors are trusted, secondly regulations of trusted behaviors of a group are abstracted on the basis of the individual behaviors, and the individual is constricted based on the regulations of the trusted behaviors of the group, so that the individual is organically combined with the group, the individual and the group are ensured to be trusted at last, and the trusted group is constructed through trusted individuals at last.

Description

technical field [0001] The invention relates to the field of trusted computing, in particular to a method for building trusted network groups based on behavior prediction control. Background technique [0002] The development of Internet technology has made the connection more convenient and the communication smoother, which has made a great contribution to the prosperity of informationization. However, with the deepening of the network, network-based computing and storage have gradually become the mainstream. Threats and terminal trustworthiness have become urgent problems to be solved. Among them, terminal security is the basis of network security, and a LAN group composed of different terminals in the same area is an important branch of the entire Internet. Terminal security is the basis of LAN group security, and LAN security is the security of the entire Internet. Base. [0003] As early as the early 1990s, a well-known information security expert proposed to solve in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
CPCG06F21/62G06F2221/2141
Inventor 黄文廷王永建王丽宏李锐光刘玮摆亮王进朱海龙邹学强苗琳
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products