Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network node machine and information network system

a network node machine and information network technology, applied in the field of network node machines and information network systems, can solve the problems of insufficient security of information resources through integral methods, inability to ensure the security of resources, and insufficient management of access security, so as to achieve the effect of effective use of computer resources

Inactive Publication Date: 2005-02-03
FUJITSU LTD +1
View PDF16 Cites 54 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0013] The present invention has been developed to solve the above-mentioned problems, and aims at dividing a zone in which calculation resources and information resources are located into a public zone and a private zone, locating in the private zone the resources to which unauthorized access is rejected, thereby guaranteeing the security of the resources in the private zone, and locating in the public zone the resources for public use, thereby propelling the public use of each resource.
[0017] As described above, according to the present invention, a part of computer resources in a node machine can be utilized in a public use while guaranteeing the private resources the security, thereby successfully realizing effective use of computer resources.

Problems solved by technology

However, the management of access security has not been integrally performed by clearly discriminating the resources between public use resources and private use, but the resources have been used on an ad hoc basis.
Therefore, the security of each information resource has been individually managed, and it has been difficult to guarantee sufficient security to information resources by means of an integral method.
However, there has been the problem with the above-mentioned conventional technology that it is not possible to sufficiently guarantee the security of resources especially for use in private use while discriminating the resources for public use from the resources for private use.
In the communications over the Internet, there are a number of calculation resources and information resources in an idle state without being effectively utilized, thereby generating large waste of resources as a social issue.
Nevertheless, there is no integral technology of utilizing the idle resources.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network node machine and information network system
  • Network node machine and information network system
  • Network node machine and information network system

Examples

Experimental program
Comparison scheme
Effect test

second embodiment

[0069] A security barrier is provided in a portal agent as described in the Practically, a security management device or a software routine is provided in a node machine having a portal agent function so that the security management unit in each portal agent can manage the security using the device or the routine.

[0070]FIG. 3 is an explanatory view of a public zone and a private zone.

[0071] The node machine 11 in the physical network 12 comprises the private zone 13 and the public zone 14. The private zone and the public zone are respectively set in a logical network management unit (community management agent) and in a physical network management unit (ACC).

[0072] A public zone is an open area, and offers a public application service as described below.

[0073] Address search of other service sites (node machine) [0074] Address caching [0075] Routing [0076] Transferring a message [0077] Distributing a message [0078] Caching related information [0079] Others

[0080] In a private zo...

third embodiment

[0161] Then, the relationship between the community when the agent joins the community and the public policy is explained below as the It is necessary for an agent to join a community, any qualification (attribute) is required. After it joins the community, it has to present any contribution (offer a service) to the community. The framework is realized by the system of an attribute and a public policy.

[0162] A public policy is represented by the description of a service rule to be presented by an agent when it joins a community. For example, it is presented in, for example, a predicate logic format.

[0163] The operation of an agent when it joins a community is described below.

[0164] (1) An agent presents its own agent attribute and a part of the attribute of the node (machine environment in which the agent operates) to the portal agent of the community.

[0165] (2) The portal agent compares the community subscription condition with the attribute of the agent requesting to join a co...

fourth embodiment

[0179] Finally, the control of the access from an agent in another community to the private resources is described below as the When a plurality of agents (nodes) communicate with one another, information is communicated through a public object operating in each public zone. Normally, a public object can access the public resources only by the access control of the public execution environment, and cannot access the private resources in the private zone. However, depending on the attribute of an agent, the private resources of the communication partner agent can be accessed. This system is realized by comparing the private policy with the agent attribute of the communication partner. A private policy is a rule described in a predicate logic, etc. in which an agent attribute corresponds to the accessibility to the resources. The private policy can be defined by the user, or can be added to the resources themselves. Described below is the operation procedure of the system.

[0180] In t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In the global information sharing and distributing service system, the public use of idle resources can be propelled and sufficient security can be guaranteed on the resources for private use. A node machine configuring an information network includes resources located in a private zone available to private use, resources located in a public zone for public service use, and a private resource security management unit for management of the security of the resources located in the private zone.

Description

BACKGROUND OF THE INVENTION [0001] 1. Field of the Invention [0002] The present invention relates to a system which manages the resources in an information distribution network and can guarantee the security of the resources and propel the public use of each resource by dividing a zone in which each of the calculation resources and the information resources into a public zone and a private zone, locating the resources to which general access is rejected in the private zone, and locating the resources for public use in the public zone. [0003] It is predicted that various calculation resources and information resources in a global network will be commonly put to public use in a global information sharing and distributing service such as grid computing, ubiquitous computing, etc. with the public taken into account. In the above-mentioned information distributing service environment, the resources management system according to the present invention provides the grounds for a number of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F12/14G06F1/00G06F12/00G06F13/00G06F15/173G06F21/00H04L9/00H04L29/06
CPCH04L63/0209G06F21/6227
Inventor AMAMIYA, MAKOTOAMAMIYA, SATOSHIIWAO, TADASHIGEOKADA, MAKOTO
Owner FUJITSU LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products