Heterogeneous network data transmission verification method based on zero trust

The heterogeneous network data transmission verification method based on zero trust provided by the invention comprises the following steps: in a heterogeneous network, constructing a trust evaluation model by applying a zero trust technology; carrying out identity trust evaluation on users and equi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: HAN DAOQI, WANG CHENGYUE, WANG QINJUN, WANG DAMING, LU YUEMING, LU WENQIANG, WU HAO, XU WENJIE, CHEN YUQIANG, FAN MINGRUI, QIN FENG, WANG ZHANFENG, GAO JIAQI
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator HAN DAOQI
WANG CHENGYUE
WANG QINJUN
WANG DAMING
LU YUEMING
LU WENQIANG
WU HAO
XU WENJIE
CHEN YUQIANG
FAN MINGRUI
QIN FENG
WANG ZHANFENG
GAO JIAQI
description The heterogeneous network data transmission verification method based on zero trust provided by the invention comprises the following steps: in a heterogeneous network, constructing a trust evaluation model by applying a zero trust technology; carrying out identity trust evaluation on users and equipment in the heterogeneous network, and carrying out risk judgment on an accessed context environment to obtain an evaluation result; and carrying out abnormal behavior identification on the access request and adopting different data verification modes according to the evaluation result. According to a visitor trust evaluation result, different data verification modes are dynamically selected, the integrity and confidentiality of data transmission are guaranteed, and resource consumption is reduced as much as possible. The single verification mode of the HASH algorithm is selected for the trust visitor, so that the operation is reduced; and a verification mode combining a HASH algorithm and symmetric encryption is
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN115865403A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN115865403A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN115865403A3</originalsourceid><addsrcrecordid>eNrjZPD3SC1JLcpPT81LzS8tVshLLSnPL8pWSEksSVQoKUrMK87NLC7OzM9TKEstykzLTE4sAXFyU0sy8lMUkhKLU1MUgPwqoBFA5aXFJTwMrGmJOcWpvFCam0HRzTXE2UM3tSA_PrW4IDEZaFNJvLOfoaGphZmpiYGxozExagDgETfl</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Heterogeneous network data transmission verification method based on zero trust</title><source>esp@cenet</source><creator>HAN DAOQI ; WANG CHENGYUE ; WANG QINJUN ; WANG DAMING ; LU YUEMING ; LU WENQIANG ; WU HAO ; XU WENJIE ; CHEN YUQIANG ; FAN MINGRUI ; QIN FENG ; WANG ZHANFENG ; GAO JIAQI</creator><creatorcontrib>HAN DAOQI ; WANG CHENGYUE ; WANG QINJUN ; WANG DAMING ; LU YUEMING ; LU WENQIANG ; WU HAO ; XU WENJIE ; CHEN YUQIANG ; FAN MINGRUI ; QIN FENG ; WANG ZHANFENG ; GAO JIAQI</creatorcontrib><description>The heterogeneous network data transmission verification method based on zero trust provided by the invention comprises the following steps: in a heterogeneous network, constructing a trust evaluation model by applying a zero trust technology; carrying out identity trust evaluation on users and equipment in the heterogeneous network, and carrying out risk judgment on an accessed context environment to obtain an evaluation result; and carrying out abnormal behavior identification on the access request and adopting different data verification modes according to the evaluation result. According to a visitor trust evaluation result, different data verification modes are dynamically selected, the integrity and confidentiality of data transmission are guaranteed, and resource consumption is reduced as much as possible. The single verification mode of the HASH algorithm is selected for the trust visitor, so that the operation is reduced; and a verification mode combining a HASH algorithm and symmetric encryption is</description><language>chi ; eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION ; WIRELESS COMMUNICATIONS NETWORKS</subject><creationdate>2023</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20230328&amp;DB=EPODOC&amp;CC=CN&amp;NR=115865403A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25543,76294</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20230328&amp;DB=EPODOC&amp;CC=CN&amp;NR=115865403A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>HAN DAOQI</creatorcontrib><creatorcontrib>WANG CHENGYUE</creatorcontrib><creatorcontrib>WANG QINJUN</creatorcontrib><creatorcontrib>WANG DAMING</creatorcontrib><creatorcontrib>LU YUEMING</creatorcontrib><creatorcontrib>LU WENQIANG</creatorcontrib><creatorcontrib>WU HAO</creatorcontrib><creatorcontrib>XU WENJIE</creatorcontrib><creatorcontrib>CHEN YUQIANG</creatorcontrib><creatorcontrib>FAN MINGRUI</creatorcontrib><creatorcontrib>QIN FENG</creatorcontrib><creatorcontrib>WANG ZHANFENG</creatorcontrib><creatorcontrib>GAO JIAQI</creatorcontrib><title>Heterogeneous network data transmission verification method based on zero trust</title><description>The heterogeneous network data transmission verification method based on zero trust provided by the invention comprises the following steps: in a heterogeneous network, constructing a trust evaluation model by applying a zero trust technology; carrying out identity trust evaluation on users and equipment in the heterogeneous network, and carrying out risk judgment on an accessed context environment to obtain an evaluation result; and carrying out abnormal behavior identification on the access request and adopting different data verification modes according to the evaluation result. According to a visitor trust evaluation result, different data verification modes are dynamically selected, the integrity and confidentiality of data transmission are guaranteed, and resource consumption is reduced as much as possible. The single verification mode of the HASH algorithm is selected for the trust visitor, so that the operation is reduced; and a verification mode combining a HASH algorithm and symmetric encryption is</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><subject>WIRELESS COMMUNICATIONS NETWORKS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2023</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZPD3SC1JLcpPT81LzS8tVshLLSnPL8pWSEksSVQoKUrMK87NLC7OzM9TKEstykzLTE4sAXFyU0sy8lMUkhKLU1MUgPwqoBFA5aXFJTwMrGmJOcWpvFCam0HRzTXE2UM3tSA_PrW4IDEZaFNJvLOfoaGphZmpiYGxozExagDgETfl</recordid><startdate>20230328</startdate><enddate>20230328</enddate><creator>HAN DAOQI</creator><creator>WANG CHENGYUE</creator><creator>WANG QINJUN</creator><creator>WANG DAMING</creator><creator>LU YUEMING</creator><creator>LU WENQIANG</creator><creator>WU HAO</creator><creator>XU WENJIE</creator><creator>CHEN YUQIANG</creator><creator>FAN MINGRUI</creator><creator>QIN FENG</creator><creator>WANG ZHANFENG</creator><creator>GAO JIAQI</creator><scope>EVB</scope></search><sort><creationdate>20230328</creationdate><title>Heterogeneous network data transmission verification method based on zero trust</title><author>HAN DAOQI ; WANG CHENGYUE ; WANG QINJUN ; WANG DAMING ; LU YUEMING ; LU WENQIANG ; WU HAO ; XU WENJIE ; CHEN YUQIANG ; FAN MINGRUI ; QIN FENG ; WANG ZHANFENG ; GAO JIAQI</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN115865403A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2023</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><topic>WIRELESS COMMUNICATIONS NETWORKS</topic><toplevel>online_resources</toplevel><creatorcontrib>HAN DAOQI</creatorcontrib><creatorcontrib>WANG CHENGYUE</creatorcontrib><creatorcontrib>WANG QINJUN</creatorcontrib><creatorcontrib>WANG DAMING</creatorcontrib><creatorcontrib>LU YUEMING</creatorcontrib><creatorcontrib>LU WENQIANG</creatorcontrib><creatorcontrib>WU HAO</creatorcontrib><creatorcontrib>XU WENJIE</creatorcontrib><creatorcontrib>CHEN YUQIANG</creatorcontrib><creatorcontrib>FAN MINGRUI</creatorcontrib><creatorcontrib>QIN FENG</creatorcontrib><creatorcontrib>WANG ZHANFENG</creatorcontrib><creatorcontrib>GAO JIAQI</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>HAN DAOQI</au><au>WANG CHENGYUE</au><au>WANG QINJUN</au><au>WANG DAMING</au><au>LU YUEMING</au><au>LU WENQIANG</au><au>WU HAO</au><au>XU WENJIE</au><au>CHEN YUQIANG</au><au>FAN MINGRUI</au><au>QIN FENG</au><au>WANG ZHANFENG</au><au>GAO JIAQI</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Heterogeneous network data transmission verification method based on zero trust</title><date>2023-03-28</date><risdate>2023</risdate><abstract>The heterogeneous network data transmission verification method based on zero trust provided by the invention comprises the following steps: in a heterogeneous network, constructing a trust evaluation model by applying a zero trust technology; carrying out identity trust evaluation on users and equipment in the heterogeneous network, and carrying out risk judgment on an accessed context environment to obtain an evaluation result; and carrying out abnormal behavior identification on the access request and adopting different data verification modes according to the evaluation result. According to a visitor trust evaluation result, different data verification modes are dynamically selected, the integrity and confidentiality of data transmission are guaranteed, and resource consumption is reduced as much as possible. The single verification mode of the HASH algorithm is selected for the trust visitor, so that the operation is reduced; and a verification mode combining a HASH algorithm and symmetric encryption is</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language chi ; eng
recordid cdi_epo_espacenet_CN115865403A
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
WIRELESS COMMUNICATIONS NETWORKS
title Heterogeneous network data transmission verification method based on zero trust
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T08%3A12%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=HAN%20DAOQI&rft.date=2023-03-28&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN115865403A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true