Trusted network and construction method and construction system of trusted network

A network construction and trusted technology, applied in the field of network security, can solve the problem that the network cannot effectively form trusted processing, and achieve the effect of improving the overall efficiency

Active Publication Date: 2021-06-18
BEIJING INFORMATION SCI & TECH UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the above problems, embodiments of the present invention provide a trusted network, a trusted network construction method, and a construction system to solve the technical problem that the existing network cannot efficiently form a trusted process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted network and construction method and construction system of trusted network
  • Trusted network and construction method and construction system of trusted network
  • Trusted network and construction method and construction system of trusted network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the purpose, technical solution and advantages of the present invention clearer and clearer, the present invention will be further described below in conjunction with the accompanying drawings and specific embodiments. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0023] An embodiment of the present invention trusted network such as figure 2 shown. exist figure 2 , this example includes:

[0024] The trust anchor 10 is used for assigning an identity identifier to a credit granting entity, forming a binding of the verification information of the trust granting entity and the identity identifier, and forming a credit granting process by responding to a credit granting request...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a trusted network, a trusted network construction method and a trusted network construction system, and solves the technical problem that the existing network cannot effectively form trusted processing. The trusted network comprises a trust anchor used for distributing an identity identifier to a credit extension entity, forming binding of verification information of the credit extension entity and the identity identifier, and responding to a credit extension request through the verification information to form a credit extension process; an identifier analysis component is used for establishing regional feature dynamic mapping of the IP address information, the public domain name information and the identity identifier information, and responding to the information request according to the regional feature dynamic mapping; and an authentication component is used for carrying out regional feature dynamic mapping and verification information caching, receiving access data in the region or transmission data outside the region to form a credit granting request, and obtaining verification information in a credit granting process through regional feature dynamic mapping. The function and form of a name and address analysis system in an original STIP model are separated and improved, the problem of function redundancy in an original system is solved, and the overall efficiency of the system is effectively improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a trusted network, a construction method and a construction system of the trusted network. Background technique [0002] In the prior art, there is a secure network configuration based on the STiP (Secure and Trusted Internet Protocol) model for security and mobility requirements. The STiP model solves network security issues such as source address spoofing, route hijacking, and denial of service from the source by introducing inherent security mechanisms such as message signature and verification, address / identity authentication, and decentralized key management, which is conducive to building independent and controllable , Safe and trusted Internet environment. Existing security network configurations such as figure 1 shown. exist figure 1 In the STiP model, the dual functions of the IP address are separated, and the network structure is divided into two parts: the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/20H04L63/0876H04L63/06H04L61/4511
Inventor 蒋文保叶帅
Owner BEIJING INFORMATION SCI & TECH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products