Heterogeneous network data transmission verification method based on zero trust
The heterogeneous network data transmission verification method based on zero trust provided by the invention comprises the following steps: in a heterogeneous network, constructing a trust evaluation model by applying a zero trust technology; carrying out identity trust evaluation on users and equi...
Gespeichert in:
Hauptverfasser: | , , , , , , , , , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | HAN DAOQI WANG CHENGYUE WANG QINJUN WANG DAMING LU YUEMING LU WENQIANG WU HAO XU WENJIE CHEN YUQIANG FAN MINGRUI QIN FENG WANG ZHANFENG GAO JIAQI |
description | The heterogeneous network data transmission verification method based on zero trust provided by the invention comprises the following steps: in a heterogeneous network, constructing a trust evaluation model by applying a zero trust technology; carrying out identity trust evaluation on users and equipment in the heterogeneous network, and carrying out risk judgment on an accessed context environment to obtain an evaluation result; and carrying out abnormal behavior identification on the access request and adopting different data verification modes according to the evaluation result. According to a visitor trust evaluation result, different data verification modes are dynamically selected, the integrity and confidentiality of data transmission are guaranteed, and resource consumption is reduced as much as possible. The single verification mode of the HASH algorithm is selected for the trust visitor, so that the operation is reduced; and a verification mode combining a HASH algorithm and symmetric encryption is |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN115865403A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN115865403A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN115865403A3</originalsourceid><addsrcrecordid>eNrjZPD3SC1JLcpPT81LzS8tVshLLSnPL8pWSEksSVQoKUrMK87NLC7OzM9TKEstykzLTE4sAXFyU0sy8lMUkhKLU1MUgPwqoBFA5aXFJTwMrGmJOcWpvFCam0HRzTXE2UM3tSA_PrW4IDEZaFNJvLOfoaGphZmpiYGxozExagDgETfl</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Heterogeneous network data transmission verification method based on zero trust</title><source>esp@cenet</source><creator>HAN DAOQI ; WANG CHENGYUE ; WANG QINJUN ; WANG DAMING ; LU YUEMING ; LU WENQIANG ; WU HAO ; XU WENJIE ; CHEN YUQIANG ; FAN MINGRUI ; QIN FENG ; WANG ZHANFENG ; GAO JIAQI</creator><creatorcontrib>HAN DAOQI ; WANG CHENGYUE ; WANG QINJUN ; WANG DAMING ; LU YUEMING ; LU WENQIANG ; WU HAO ; XU WENJIE ; CHEN YUQIANG ; FAN MINGRUI ; QIN FENG ; WANG ZHANFENG ; GAO JIAQI</creatorcontrib><description>The heterogeneous network data transmission verification method based on zero trust provided by the invention comprises the following steps: in a heterogeneous network, constructing a trust evaluation model by applying a zero trust technology; carrying out identity trust evaluation on users and equipment in the heterogeneous network, and carrying out risk judgment on an accessed context environment to obtain an evaluation result; and carrying out abnormal behavior identification on the access request and adopting different data verification modes according to the evaluation result. According to a visitor trust evaluation result, different data verification modes are dynamically selected, the integrity and confidentiality of data transmission are guaranteed, and resource consumption is reduced as much as possible. The single verification mode of the HASH algorithm is selected for the trust visitor, so that the operation is reduced; and a verification mode combining a HASH algorithm and symmetric encryption is</description><language>chi ; eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION ; WIRELESS COMMUNICATIONS NETWORKS</subject><creationdate>2023</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20230328&DB=EPODOC&CC=CN&NR=115865403A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25543,76294</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20230328&DB=EPODOC&CC=CN&NR=115865403A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>HAN DAOQI</creatorcontrib><creatorcontrib>WANG CHENGYUE</creatorcontrib><creatorcontrib>WANG QINJUN</creatorcontrib><creatorcontrib>WANG DAMING</creatorcontrib><creatorcontrib>LU YUEMING</creatorcontrib><creatorcontrib>LU WENQIANG</creatorcontrib><creatorcontrib>WU HAO</creatorcontrib><creatorcontrib>XU WENJIE</creatorcontrib><creatorcontrib>CHEN YUQIANG</creatorcontrib><creatorcontrib>FAN MINGRUI</creatorcontrib><creatorcontrib>QIN FENG</creatorcontrib><creatorcontrib>WANG ZHANFENG</creatorcontrib><creatorcontrib>GAO JIAQI</creatorcontrib><title>Heterogeneous network data transmission verification method based on zero trust</title><description>The heterogeneous network data transmission verification method based on zero trust provided by the invention comprises the following steps: in a heterogeneous network, constructing a trust evaluation model by applying a zero trust technology; carrying out identity trust evaluation on users and equipment in the heterogeneous network, and carrying out risk judgment on an accessed context environment to obtain an evaluation result; and carrying out abnormal behavior identification on the access request and adopting different data verification modes according to the evaluation result. According to a visitor trust evaluation result, different data verification modes are dynamically selected, the integrity and confidentiality of data transmission are guaranteed, and resource consumption is reduced as much as possible. The single verification mode of the HASH algorithm is selected for the trust visitor, so that the operation is reduced; and a verification mode combining a HASH algorithm and symmetric encryption is</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><subject>WIRELESS COMMUNICATIONS NETWORKS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2023</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZPD3SC1JLcpPT81LzS8tVshLLSnPL8pWSEksSVQoKUrMK87NLC7OzM9TKEstykzLTE4sAXFyU0sy8lMUkhKLU1MUgPwqoBFA5aXFJTwMrGmJOcWpvFCam0HRzTXE2UM3tSA_PrW4IDEZaFNJvLOfoaGphZmpiYGxozExagDgETfl</recordid><startdate>20230328</startdate><enddate>20230328</enddate><creator>HAN DAOQI</creator><creator>WANG CHENGYUE</creator><creator>WANG QINJUN</creator><creator>WANG DAMING</creator><creator>LU YUEMING</creator><creator>LU WENQIANG</creator><creator>WU HAO</creator><creator>XU WENJIE</creator><creator>CHEN YUQIANG</creator><creator>FAN MINGRUI</creator><creator>QIN FENG</creator><creator>WANG ZHANFENG</creator><creator>GAO JIAQI</creator><scope>EVB</scope></search><sort><creationdate>20230328</creationdate><title>Heterogeneous network data transmission verification method based on zero trust</title><author>HAN DAOQI ; WANG CHENGYUE ; WANG QINJUN ; WANG DAMING ; LU YUEMING ; LU WENQIANG ; WU HAO ; XU WENJIE ; CHEN YUQIANG ; FAN MINGRUI ; QIN FENG ; WANG ZHANFENG ; GAO JIAQI</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN115865403A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2023</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><topic>WIRELESS COMMUNICATIONS NETWORKS</topic><toplevel>online_resources</toplevel><creatorcontrib>HAN DAOQI</creatorcontrib><creatorcontrib>WANG CHENGYUE</creatorcontrib><creatorcontrib>WANG QINJUN</creatorcontrib><creatorcontrib>WANG DAMING</creatorcontrib><creatorcontrib>LU YUEMING</creatorcontrib><creatorcontrib>LU WENQIANG</creatorcontrib><creatorcontrib>WU HAO</creatorcontrib><creatorcontrib>XU WENJIE</creatorcontrib><creatorcontrib>CHEN YUQIANG</creatorcontrib><creatorcontrib>FAN MINGRUI</creatorcontrib><creatorcontrib>QIN FENG</creatorcontrib><creatorcontrib>WANG ZHANFENG</creatorcontrib><creatorcontrib>GAO JIAQI</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>HAN DAOQI</au><au>WANG CHENGYUE</au><au>WANG QINJUN</au><au>WANG DAMING</au><au>LU YUEMING</au><au>LU WENQIANG</au><au>WU HAO</au><au>XU WENJIE</au><au>CHEN YUQIANG</au><au>FAN MINGRUI</au><au>QIN FENG</au><au>WANG ZHANFENG</au><au>GAO JIAQI</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Heterogeneous network data transmission verification method based on zero trust</title><date>2023-03-28</date><risdate>2023</risdate><abstract>The heterogeneous network data transmission verification method based on zero trust provided by the invention comprises the following steps: in a heterogeneous network, constructing a trust evaluation model by applying a zero trust technology; carrying out identity trust evaluation on users and equipment in the heterogeneous network, and carrying out risk judgment on an accessed context environment to obtain an evaluation result; and carrying out abnormal behavior identification on the access request and adopting different data verification modes according to the evaluation result. According to a visitor trust evaluation result, different data verification modes are dynamically selected, the integrity and confidentiality of data transmission are guaranteed, and resource consumption is reduced as much as possible. The single verification mode of the HASH algorithm is selected for the trust visitor, so that the operation is reduced; and a verification mode combining a HASH algorithm and symmetric encryption is</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | chi ; eng |
recordid | cdi_epo_espacenet_CN115865403A |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION WIRELESS COMMUNICATIONS NETWORKS |
title | Heterogeneous network data transmission verification method based on zero trust |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T08%3A12%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=HAN%20DAOQI&rft.date=2023-03-28&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN115865403A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |