Designing method for integrating multilevel ubiquitous network security perception component

A design method, multi-level technology, applied in the field of integrated ubiquitous network security awareness

Inactive Publication Date: 2013-09-18
WUXI NANLIGONG TECH DEV
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is a flaw in this design, that is, once the SIM card is lost, all identity authentication information will be lost
In addition, Japan and South Korea also proposed some basic security requirements for mobile ubiquitous networks, but did not propose specific solutions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Designing method for integrating multilevel ubiquitous network security perception component
  • Designing method for integrating multilevel ubiquitous network security perception component
  • Designing method for integrating multilevel ubiquitous network security perception component

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0027] combine figure 1 , the present invention relates to a method for designing a multi-level security perception component of a fusion ubiquitous network. The steps of the security decision-making process are as follows:

[0028] 1. The user makes an access request to the protected resource;

[0029] 2. The protected resource forwards the user's access request to the security decision engine;

[0030] 3. According to this request, the security decision-making engine requests the "system terminal security situation model" assigned with the basic credibility to analyze the security situation;

[0031] 4. The security situation model returns the analysis results to the security decision engine;

[0032] 5. The security decision engine queries the security policy database for relevant security policies, such as access control policies;

[0033] 6. The sec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of integrating ubiquitous network security perception, and discloses a designing method for a multilevel ubiquitous network security perception component based on security situation analysis, security policy management and the like. The method comprises the steps of firstly, developing a security engine by utilizing Java MIDP (Mobile Information Device Profile) 2.0, then sending a request of a terminal through an event driving mechanism, continuously calling the information on security situation management, security policy database, a context server and the like of the system terminal through the security engine so as to realize the dynamic roles or permission grant, making comprehensive evaluation to the request, responding the evaluation result to an application program (a carrier of protected resources), and allowing or rejecting the access of a user by the protected resource according to the response. According to the method, a middleware technology, a network security situation awareness technology, a network security analysis technology and the like are integrated, the security control problem under a terminal environment and the problems of heterogeneous authentication, access, interoperability control, privacy protection, data safe sharing and the like are solved, and safe guarantee is provided for the user.

Description

technical field [0001] The invention belongs to the field of integrated ubiquitous network security awareness, in particular to a design method for integrated ubiquitous network multi-level security awareness components. Background technique [0002] With the continuous development of mobile communication networks, wireless access technology, terminal technology, network technology and service platform technology are developing towards heterogeneity, diversification and ubiquity. The diversity of ubiquitous terminals poses challenges for authentication and safe and reliable access between heterogeneous terminals. The ubiquitous nature of the ubiquitous network means that illegal terminals can more easily launch intrusions and attacks on the network. Therefore, it is necessary to conduct research on issues such as authentication, access control, secure data transmission and sharing, and interoperability control based on the heterogeneous and lightweight characteristics of ub...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 李千目刘振侯君戚湧
Owner WUXI NANLIGONG TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products