Hierarchical network information content managing method based on public key basic facilities

A public key infrastructure and network information technology, which is applied in the field of Internet information content security supervision, can solve the problems of labeling the responsibility of label forgers or label issuers, relying on the self-discipline of network users, and managing safe and unsafe network media content. To achieve the effect of reducing redundant construction, simplifying system structure and realizing

Inactive Publication Date: 2002-05-15
SHANGHAI JIAO TONG UNIV
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The invention relates to managing files on electronic devices securely through digital signatures. It uses an authentication service called Public Key Signature System (PKIS), which helps verify if someone has access rights before signing them over onto their webpages. This ensures they are valid while also preventing illegal modifications made during printing processes. Additionally, there's another way to manage keys certificated/signed documents efficiently without repeatedly copying them. Overall, this technology improves efficiency and accuracy when creating brand-new products from scratches into production environments.

Problems solved by technology

This technical problem addressed in this patented text relates to existing methods used for managing internet accessibility issues like fake websites. These techniques are limited because they rely heavily upon user autonomy which can be easily manipulated without being detected.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hierarchical network information content managing method based on public key basic facilities
  • Hierarchical network information content managing method based on public key basic facilities
  • Hierarchical network information content managing method based on public key basic facilities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The following is based on figure 1 And Fig. 2 provides a preferred embodiment of the present invention.

[0040] see figure 1 , as shown in the figure: A hierarchical management center system based on PKI has been established, and the RA structure of each part is described as follows: the labels shown in the figure are:

[0041] 1: Grading Standard Center RSA 2: (Level 1) Label Management Center LMA

[0042] 3: (subordinate) label management center LMA 4; label adding center LAA

[0043] 5: Web site to be rated 6: Web page to be rated

[0044] 7: Authorization 8: Distribution Adding tags

[0045]It can be seen from the figure that the system of this embodiment is a tree structure, and the root node is the classification standard center (RSA) 1, which is the highest point and is also the organization responsible for formulating the general strategy of the entire classification system. Below it is the first Level label management center (LMA) 2, under this (LMA) 2 ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The steps are: to build stratified and graded label issuing system organization for realizing global positioning and distinguish functions of label issuing organization, to build safety protecting mechanism of network informatino content graded global, to build graded content servity mechansm. The invention has good safety and security function which can achieve the standard required by traditional graded management technique and has tracking and deny preventing function which can be utilized for invesigating responsibility effectively. The management method can be used for inter-network, inner network and special network as an effective method of inner information graded sharing and safety. The method with additional label is used to proceed identify sensitive information content, the user's authority is confirmed by checking identity, thus to achieve the purpose of information safety sharing in government confidencial department.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products