Trusting method of network information system based on family genes

A network information and family technology, applied in transmission systems, electrical components, etc., can solve problems such as high cost, user centralized registration and identity verification methods are difficult to adapt to actual user applications, and certificate subject information is unclear.

Inactive Publication Date: 2006-08-16
成都世纪顶点科技有限公司
View PDF9 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this PKI / PMI-based trust method has obvious shortcomings: the information of the certificate subject is not clear, and it is difficult to distinguish entities with the same name in reality; the amount of calculation is large, the efficiency is low, the key management is difficult, the implementation is complicated, and the cost is high;…; and many more
[0004] The applications with patent publication numbers CN1674499 and CN1674500 identify the identity of users by collecting fingerprints, but these technologies cannot identify the identity of network devices; the applications with patent publication numbers CN1547142, CN1564511, and CN1614924 propose identity authentication methods based on dynamic passwords , to solve the defects such as insecure password plaintext transmission, but they all depend on the wireless mobile network, so the scope of application is limited; the application cases with patent publication numbers CN1444169, CN1449154, and CN1545243 provide identity authentication technology based on public key certificates, Although it has been specifically applied in the project, it cannot solve the problems of complex key management and unclear subject information of public key certificates.
The application with patent publication number CN1627683 realizes the integration of user authentication and access control in multiple application systems, but the centralized registration and identity verification methods for users are difficult to adapt to the actual application of a large number of users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusting method of network information system based on family genes
  • Trusting method of network information system based on family genes
  • Trusting method of network information system based on family genes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] figure 1 is the evolution graph of the network family.

[0039] From figure 1 It can be seen that the entire network evolved from an "ancestor network", which means that the "ancestor network" is the starting point of trust in the entire network. The evolution graph of a network family is similar to an inverted tree, denoted by T, and each node n of the tree T can represent a parent, child, visitor, or temporary member (the root node represents the ancestor network).

[0040] The specific steps to construct a network family are as follows:

[0041] (1) The steps of "ancestor network" generation:

[0042] 1) Initially, set the network family evolution graph T to be empty;

[0043] 2) Create "ancestor network" node n 0 , n 0 ∈ F,n 0 It is the starting point of trust in the entire network;

[0044] 3) Set the "ancestor network" node, including:

[0045] ① Set the node name category: n 0 .name = network ancestor, n 0 .type=parent;

[0046] ②Assigned family gene:...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention constructs an evolution graph of network family and uses it to build a trust relationship. The evolution graph of network family includes parents, children, visitor and temporary member. Wherein, the children are actual services in network. Each sub-network family has a housemaster, and under his control there are children, visitor and temporary member. The housemaster assigns gene for others and makes relevant family rules (access control strategy). All family members inherit family gene from father. Whole network evolves from an original ancestor network. The legal position of all family members is ensured by appointing family gene, variation gene, genetic code, gene signature and family rules. The gene assignation and gene signature compose a gene certificate that can not be decrypted by outsider.

Description

technical field [0001] The invention proposes a family gene-based trust method for a network information system, which belongs to the field of computer network and information security. Background technique [0002] The trust method in computer network and information security technology provides the basis for mutual trust between the two parties in communication, mainly including identity authentication and access control, and is the basis for ensuring the security of network information systems. [0003] In the field of information security, most of the traditional identity authentication and access control methods are based on public key infrastructure / privilege management infrastructure (PKI / PMI). and other methods to achieve access control. However, this PKI / PMI-based trust method has obvious shortcomings: the certificate subject information is not clear, and it is difficult to distinguish entities with the same name in reality; large amount of calculation, low efficie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 李涛
Owner 成都世纪顶点科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products