CREDIBILITY EVALUATION METHOD

PROBLEM TO BE SOLVED: To solve the problem that considerable load is required to collect certificates proving credibility and the problem that information about achievement of actions to be evaluated to prove reliability and credibility of a partner in the actual system is not reflected on evaluatio...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: ANDO ERIKO, SAKAZAKI HISAO, FUKUZAWA YASUKO
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator ANDO ERIKO
SAKAZAKI HISAO
FUKUZAWA YASUKO
description PROBLEM TO BE SOLVED: To solve the problem that considerable load is required to collect certificates proving credibility and the problem that information about achievement of actions to be evaluated to prove reliability and credibility of a partner in the actual system is not reflected on evaluation of credibility in the PGP system for calculating credibility from a certificate of a neighborhood in place of the authentication department because evaluation of credibility is not sufficient in the case where the authentication department is not provided and a certificate of a key of a communication terminal cannot be verified sufficiently. SOLUTION: A wireless security system is formed of a communication terminal and a profile of this wireless security system is characterized in the following three means, (1) the communication terminal has a function for monitoring achievements of credibility evaluation object, (2) the communication terminal evaluates different classes such as possessions and achievements, and (3) the communication terminal totally evaluates the communication terminal through direct evaluation of the evaluation object and indirect evaluation of the evaluation object by the other communication terminal. COPYRIGHT: (C)2008,JPO&INPIT
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_JP2008131564A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>JP2008131564A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_JP2008131564A3</originalsourceid><addsrcrecordid>eNrjZJB1DnJ18XTy9PEMiVRwDXP0CXUM8fT3U_B1DfHwd-FhYE1LzClO5YXS3AxKbq4hzh66qQX58anFBYnJqXmpJfFeAUYGBhaGxoamZiaOxkQpAgDgmCGh</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>CREDIBILITY EVALUATION METHOD</title><source>esp@cenet</source><creator>ANDO ERIKO ; SAKAZAKI HISAO ; FUKUZAWA YASUKO</creator><creatorcontrib>ANDO ERIKO ; SAKAZAKI HISAO ; FUKUZAWA YASUKO</creatorcontrib><description>PROBLEM TO BE SOLVED: To solve the problem that considerable load is required to collect certificates proving credibility and the problem that information about achievement of actions to be evaluated to prove reliability and credibility of a partner in the actual system is not reflected on evaluation of credibility in the PGP system for calculating credibility from a certificate of a neighborhood in place of the authentication department because evaluation of credibility is not sufficient in the case where the authentication department is not provided and a certificate of a key of a communication terminal cannot be verified sufficiently. SOLUTION: A wireless security system is formed of a communication terminal and a profile of this wireless security system is characterized in the following three means, (1) the communication terminal has a function for monitoring achievements of credibility evaluation object, (2) the communication terminal evaluates different classes such as possessions and achievements, and (3) the communication terminal totally evaluates the communication terminal through direct evaluation of the evaluation object and indirect evaluation of the evaluation object by the other communication terminal. COPYRIGHT: (C)2008,JPO&amp;INPIT</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION ; WIRELESS COMMUNICATIONS NETWORKS</subject><creationdate>2008</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20080605&amp;DB=EPODOC&amp;CC=JP&amp;NR=2008131564A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,777,882,25545,76296</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20080605&amp;DB=EPODOC&amp;CC=JP&amp;NR=2008131564A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>ANDO ERIKO</creatorcontrib><creatorcontrib>SAKAZAKI HISAO</creatorcontrib><creatorcontrib>FUKUZAWA YASUKO</creatorcontrib><title>CREDIBILITY EVALUATION METHOD</title><description>PROBLEM TO BE SOLVED: To solve the problem that considerable load is required to collect certificates proving credibility and the problem that information about achievement of actions to be evaluated to prove reliability and credibility of a partner in the actual system is not reflected on evaluation of credibility in the PGP system for calculating credibility from a certificate of a neighborhood in place of the authentication department because evaluation of credibility is not sufficient in the case where the authentication department is not provided and a certificate of a key of a communication terminal cannot be verified sufficiently. SOLUTION: A wireless security system is formed of a communication terminal and a profile of this wireless security system is characterized in the following three means, (1) the communication terminal has a function for monitoring achievements of credibility evaluation object, (2) the communication terminal evaluates different classes such as possessions and achievements, and (3) the communication terminal totally evaluates the communication terminal through direct evaluation of the evaluation object and indirect evaluation of the evaluation object by the other communication terminal. COPYRIGHT: (C)2008,JPO&amp;INPIT</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><subject>WIRELESS COMMUNICATIONS NETWORKS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2008</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZJB1DnJ18XTy9PEMiVRwDXP0CXUM8fT3U_B1DfHwd-FhYE1LzClO5YXS3AxKbq4hzh66qQX58anFBYnJqXmpJfFeAUYGBhaGxoamZiaOxkQpAgDgmCGh</recordid><startdate>20080605</startdate><enddate>20080605</enddate><creator>ANDO ERIKO</creator><creator>SAKAZAKI HISAO</creator><creator>FUKUZAWA YASUKO</creator><scope>EVB</scope></search><sort><creationdate>20080605</creationdate><title>CREDIBILITY EVALUATION METHOD</title><author>ANDO ERIKO ; SAKAZAKI HISAO ; FUKUZAWA YASUKO</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_JP2008131564A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2008</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><topic>WIRELESS COMMUNICATIONS NETWORKS</topic><toplevel>online_resources</toplevel><creatorcontrib>ANDO ERIKO</creatorcontrib><creatorcontrib>SAKAZAKI HISAO</creatorcontrib><creatorcontrib>FUKUZAWA YASUKO</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>ANDO ERIKO</au><au>SAKAZAKI HISAO</au><au>FUKUZAWA YASUKO</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>CREDIBILITY EVALUATION METHOD</title><date>2008-06-05</date><risdate>2008</risdate><abstract>PROBLEM TO BE SOLVED: To solve the problem that considerable load is required to collect certificates proving credibility and the problem that information about achievement of actions to be evaluated to prove reliability and credibility of a partner in the actual system is not reflected on evaluation of credibility in the PGP system for calculating credibility from a certificate of a neighborhood in place of the authentication department because evaluation of credibility is not sufficient in the case where the authentication department is not provided and a certificate of a key of a communication terminal cannot be verified sufficiently. SOLUTION: A wireless security system is formed of a communication terminal and a profile of this wireless security system is characterized in the following three means, (1) the communication terminal has a function for monitoring achievements of credibility evaluation object, (2) the communication terminal evaluates different classes such as possessions and achievements, and (3) the communication terminal totally evaluates the communication terminal through direct evaluation of the evaluation object and indirect evaluation of the evaluation object by the other communication terminal. COPYRIGHT: (C)2008,JPO&amp;INPIT</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_JP2008131564A
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
WIRELESS COMMUNICATIONS NETWORKS
title CREDIBILITY EVALUATION METHOD
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T12%3A57%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=ANDO%20ERIKO&rft.date=2008-06-05&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EJP2008131564A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true