CREDIBILITY EVALUATION METHOD
PROBLEM TO BE SOLVED: To solve the problem that considerable load is required to collect certificates proving credibility and the problem that information about achievement of actions to be evaluated to prove reliability and credibility of a partner in the actual system is not reflected on evaluatio...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | ANDO ERIKO SAKAZAKI HISAO FUKUZAWA YASUKO |
description | PROBLEM TO BE SOLVED: To solve the problem that considerable load is required to collect certificates proving credibility and the problem that information about achievement of actions to be evaluated to prove reliability and credibility of a partner in the actual system is not reflected on evaluation of credibility in the PGP system for calculating credibility from a certificate of a neighborhood in place of the authentication department because evaluation of credibility is not sufficient in the case where the authentication department is not provided and a certificate of a key of a communication terminal cannot be verified sufficiently. SOLUTION: A wireless security system is formed of a communication terminal and a profile of this wireless security system is characterized in the following three means, (1) the communication terminal has a function for monitoring achievements of credibility evaluation object, (2) the communication terminal evaluates different classes such as possessions and achievements, and (3) the communication terminal totally evaluates the communication terminal through direct evaluation of the evaluation object and indirect evaluation of the evaluation object by the other communication terminal. COPYRIGHT: (C)2008,JPO&INPIT |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_JP2008131564A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>JP2008131564A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_JP2008131564A3</originalsourceid><addsrcrecordid>eNrjZJB1DnJ18XTy9PEMiVRwDXP0CXUM8fT3U_B1DfHwd-FhYE1LzClO5YXS3AxKbq4hzh66qQX58anFBYnJqXmpJfFeAUYGBhaGxoamZiaOxkQpAgDgmCGh</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>CREDIBILITY EVALUATION METHOD</title><source>esp@cenet</source><creator>ANDO ERIKO ; SAKAZAKI HISAO ; FUKUZAWA YASUKO</creator><creatorcontrib>ANDO ERIKO ; SAKAZAKI HISAO ; FUKUZAWA YASUKO</creatorcontrib><description>PROBLEM TO BE SOLVED: To solve the problem that considerable load is required to collect certificates proving credibility and the problem that information about achievement of actions to be evaluated to prove reliability and credibility of a partner in the actual system is not reflected on evaluation of credibility in the PGP system for calculating credibility from a certificate of a neighborhood in place of the authentication department because evaluation of credibility is not sufficient in the case where the authentication department is not provided and a certificate of a key of a communication terminal cannot be verified sufficiently. SOLUTION: A wireless security system is formed of a communication terminal and a profile of this wireless security system is characterized in the following three means, (1) the communication terminal has a function for monitoring achievements of credibility evaluation object, (2) the communication terminal evaluates different classes such as possessions and achievements, and (3) the communication terminal totally evaluates the communication terminal through direct evaluation of the evaluation object and indirect evaluation of the evaluation object by the other communication terminal. COPYRIGHT: (C)2008,JPO&INPIT</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION ; WIRELESS COMMUNICATIONS NETWORKS</subject><creationdate>2008</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20080605&DB=EPODOC&CC=JP&NR=2008131564A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,777,882,25545,76296</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20080605&DB=EPODOC&CC=JP&NR=2008131564A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>ANDO ERIKO</creatorcontrib><creatorcontrib>SAKAZAKI HISAO</creatorcontrib><creatorcontrib>FUKUZAWA YASUKO</creatorcontrib><title>CREDIBILITY EVALUATION METHOD</title><description>PROBLEM TO BE SOLVED: To solve the problem that considerable load is required to collect certificates proving credibility and the problem that information about achievement of actions to be evaluated to prove reliability and credibility of a partner in the actual system is not reflected on evaluation of credibility in the PGP system for calculating credibility from a certificate of a neighborhood in place of the authentication department because evaluation of credibility is not sufficient in the case where the authentication department is not provided and a certificate of a key of a communication terminal cannot be verified sufficiently. SOLUTION: A wireless security system is formed of a communication terminal and a profile of this wireless security system is characterized in the following three means, (1) the communication terminal has a function for monitoring achievements of credibility evaluation object, (2) the communication terminal evaluates different classes such as possessions and achievements, and (3) the communication terminal totally evaluates the communication terminal through direct evaluation of the evaluation object and indirect evaluation of the evaluation object by the other communication terminal. COPYRIGHT: (C)2008,JPO&INPIT</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><subject>WIRELESS COMMUNICATIONS NETWORKS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2008</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZJB1DnJ18XTy9PEMiVRwDXP0CXUM8fT3U_B1DfHwd-FhYE1LzClO5YXS3AxKbq4hzh66qQX58anFBYnJqXmpJfFeAUYGBhaGxoamZiaOxkQpAgDgmCGh</recordid><startdate>20080605</startdate><enddate>20080605</enddate><creator>ANDO ERIKO</creator><creator>SAKAZAKI HISAO</creator><creator>FUKUZAWA YASUKO</creator><scope>EVB</scope></search><sort><creationdate>20080605</creationdate><title>CREDIBILITY EVALUATION METHOD</title><author>ANDO ERIKO ; SAKAZAKI HISAO ; FUKUZAWA YASUKO</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_JP2008131564A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2008</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><topic>WIRELESS COMMUNICATIONS NETWORKS</topic><toplevel>online_resources</toplevel><creatorcontrib>ANDO ERIKO</creatorcontrib><creatorcontrib>SAKAZAKI HISAO</creatorcontrib><creatorcontrib>FUKUZAWA YASUKO</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>ANDO ERIKO</au><au>SAKAZAKI HISAO</au><au>FUKUZAWA YASUKO</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>CREDIBILITY EVALUATION METHOD</title><date>2008-06-05</date><risdate>2008</risdate><abstract>PROBLEM TO BE SOLVED: To solve the problem that considerable load is required to collect certificates proving credibility and the problem that information about achievement of actions to be evaluated to prove reliability and credibility of a partner in the actual system is not reflected on evaluation of credibility in the PGP system for calculating credibility from a certificate of a neighborhood in place of the authentication department because evaluation of credibility is not sufficient in the case where the authentication department is not provided and a certificate of a key of a communication terminal cannot be verified sufficiently. SOLUTION: A wireless security system is formed of a communication terminal and a profile of this wireless security system is characterized in the following three means, (1) the communication terminal has a function for monitoring achievements of credibility evaluation object, (2) the communication terminal evaluates different classes such as possessions and achievements, and (3) the communication terminal totally evaluates the communication terminal through direct evaluation of the evaluation object and indirect evaluation of the evaluation object by the other communication terminal. COPYRIGHT: (C)2008,JPO&INPIT</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_JP2008131564A |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TRANSMISSION TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION WIRELESS COMMUNICATIONS NETWORKS |
title | CREDIBILITY EVALUATION METHOD |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T12%3A57%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=ANDO%20ERIKO&rft.date=2008-06-05&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EJP2008131564A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |