Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and system for secure data transmission based on terminal trust management

A data security and trust management technology, applied in the field of data security transmission, can solve problems such as service attacks and damage to data security, and achieve the effects of ensuring security, improving security, and ensuring safe transmission

Active Publication Date: 2021-10-01
北京电信易通信息技术股份有限公司
View PDF22 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] After research and analysis, it is found that the main reason for data transmission security problems is: the network side unconditionally trusts the terminal accessing the conference, and the terminals connected to it are trusted by default, and all their behaviors are trusted; however, malicious terminals will use This "implicit trust" initiates attacks such as denial of service attacks, monitoring, tampering with meeting content, etc.
This is equivalent to destroying the security of data at the source of data transmission, even if the security of data transmission technology is higher in the subsequent transmission process, it will not help

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for secure data transmission based on terminal trust management
  • A method and system for secure data transmission based on terminal trust management
  • A method and system for secure data transmission based on terminal trust management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] Next, the technical solutions in the embodiments of the present invention will be apparent from the embodiment of the present invention, and it is clearly described, and it is understood that the described embodiments are merely embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, there are all other embodiments obtained without making creative labor without making creative labor premises.

[0070] In order to make the above objects, features, and advantages of the present invention, the present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments.

[0071] figure 1 For the present invention, a data secure transmission method based on terminal trust management is schematic diagram, such as figure 1 As shown, a data secure transmission method based on terminal trust management includes the following steps:

[0072] Step 101: When the terminal i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a method and system for secure data transmission based on terminal trust management. The method includes: when a terminal to be evaluated applies for accessing a video conferencing system, determining a benchmark trust value of the terminal to be evaluated according to a historical trust value; determining a terminal to be evaluated In the historical interaction with the network center, the rate of data security transmission and the rate of initiating attacks; according to the rate of data security transmission and the rate of initiating attacks, determine the self-assessment trust value of the terminal to be evaluated; through the network center, collect and evaluate the terminal The evaluation of the terminal to be evaluated by the terminal that has interacted; determine the other-evaluation trust value of the terminal to be evaluated according to the evaluation set; determine the behavior trust value of the terminal to be evaluated according to the self-evaluation trust value and other-evaluation trust value; Determine the global trust value of the terminal to be evaluated; determine whether the terminal to be evaluated is allowed to access the video conference system according to the global trust value. The invention improves the security of data transmission.

Description

Technical field [0001] The present invention relates to the field of data secure transmission technology, and more particularly to a data secure transmission method and system based on terminal trust management. Background technique [0002] Video conference is a conference method that allows multiple users from different places to interpire video, file materials, and implement real-time conference methods through network and multimedia equipment. Compared with the ordinary face-to-face meeting, the video conference has been favored by many companies with its advantages of increasing the cost of the company due to no need to flow due to no personnel flow. In addition, because of the above advantages of video conferencing, some government agencies, medical systems, education systems, etc. have gradually begin to apply video conferencing systems. Therefore, the video conference method is rapidly occupying the highland of new office methods, and its popularization will be a trend. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N7/15H04L29/06H04L12/24
CPCH04L41/142H04L63/20H04N7/155
Inventor 刘晨陶子元朱敏孟夏冰
Owner 北京电信易通信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products