Method of implementing reliable service on complementary structure information network

A structural information and credible technology, applied in the direction of electrical components, transmission systems, etc., can solve the problem of discounting the credibility of services provided by the Internet

Inactive Publication Date: 2008-03-05
马建国 +1
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This makes the overall information structure of the society based on the Internet (military, economic, political, management, and even transportation, communication, medical care, etc.) highly vulnerable and risky, so that information security threats have a strong impact on the whole society. Destructive, but also greatly reduces the credibility of the Internet to provide services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of implementing reliable service on complementary structure information network
  • Method of implementing reliable service on complementary structure information network
  • Method of implementing reliable service on complementary structure information network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The invention provides a method for realizing trusted services on a complementary structure information network, including trusted services from information content providers to data processing centers, trusted services from data processing centers to users, and from information content providers to data processing The trusted service of the center includes the digital signature of information content, the integrity of information content, confidentiality, and non-repudiation functions, and the trusted service content from the data processing center to users includes the reliability, integrity, and confidentiality of information. The realization of the trusted service is based on the PKI / CA model, and the UCL indexing method is used to realize the indexing of the parameters. The present invention utilizes the existing UCL indexing method, such as the existing Chinese patent publication numbers CN1684415, CN1684459, and CN1684460 The UCL indexing method described.

[001...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses method for implementing credible service in complemental configurable information network. The said credible services include the credible service of information transmission from information content provider of No.i (iCP) to Data Process Center (DPC), and the credible service provided by DPC to users. The credible service from iCP to DPC includes functions of digital signature, integrality of information content, security, and anti denial capability etc for information content provided by iCP. Content of the credible service from DPC to user includes integrality and security etc. the disclosed credible services guarantee security and confidence level of complemental configurable information network.

Description

technical field [0001] The invention proposes a method for realizing network credible service, especially a method for realizing credible service on the complementary structure information network which utilizes the basic structure of complementary structure Internet to realize credible service. Background technique [0002] Due to the open nature of the Internet, anyone can connect freely, and there is no time and space restrictions, no concept of geographical distance, anyone can join the Internet anytime, anywhere, there is no so-called supreme authority in the network, and there is no control . This makes the overall information structure of the society based on the Internet (military, economic, political, management, and even transportation, communication, medical care, etc.) highly vulnerable and risky, so that information security threats have a strong impact on the whole society. Destructiveness also greatly reduces the credibility of Internet services. How to make...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 马建国孙海峰
Owner 马建国
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products