Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A trusted network connection method for enhancing security

A network connection and security technology, applied in the field of trusted network connection with enhanced security, which can solve the problems of unequal evaluation of AIK certificate validity and platform integrity, inability to verify access requesters, and low security.

Active Publication Date: 2008-08-13
CHINA IWNCOMM
View PDF0 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0019] The purpose of the present invention is to provide a trusted network connection method with enhanced security, which solves the technical problems in the background technology that the security is relatively low, the access requester may not be able to verify the validity of the AIK certificate, and the platform integrity evaluation is not equal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A trusted network connection method for enhancing security
  • A trusted network connection method for enhancing security
  • A trusted network connection method for enhancing security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0081] Since most of the existing networks are deployed using the TCG-TNC architecture, especially the wired network, the present invention is a trusted network connection architecture with enhanced security established on the TCG-TNC architecture. The present invention is mainly composed of a network access layer, an integrity evaluation layer and an integrity measurement layer, and four logical entities of an access requester, a policy enforcement point, an access authorizer and a policy manager can be distributed anywhere in the network. The access requester is also called requester, user station, etc., and the policy manager is also called authentication server, trusted server, background server, etc.

[0082]The network access layer is responsible for the two-way user authentication and key negotiation between the access requester and the access authorizer, the key negotiation between the access requester and the policy enforcement point, and the mutual access control betw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a trusted network connection method for enhancing security, which pre-prepares a platform integrality information, prepares an integrality authentication request. A network access requester sends a access request to a network access controller, the network access controller starts a two-way authentication process of users, and user authentication service unit performs an equal authentication protocol. After the two-way user authentication is success, a TNC client-side and a TNC service side execute a platform integrality evaluate. The network access requester and network access authorizer achieve an inter access control between the access requester and a access authorizer based on a recommended control terminal respectively. The invention solves the technical problems in background technology that the security is low, the access requester may not validate validity of AIK certificate and the platform integrality evaluate is unequal. The invention simplifies the key management and integrality authentication mechanism, expands the range of applicability of trusted network connection.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a trusted network connection method for enhancing security. Background technique [0002] With the development of informatization, the problems of malicious software such as viruses and worms are extremely prominent. There have been more than 35,000 kinds of malicious software, and more than 40 million computers are infected every year. To contain such attacks, it is necessary not only to solve the problem of secure transmission and data input checks, but also to start defense from the source, that is, from every terminal connected to the network. However, traditional security defense technologies have been unable to defend against a wide variety of malicious attacks. [0003] In response to this problem, the International Trusted Computing Organization TCG has specially formulated a network connection specification based on trusted computing technology - T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3263H04L2209/127H04L63/105H04L9/0844H04L9/3247H04L63/20H04L41/0893H04L63/0869H04L63/0876
Inventor 肖跃雷曹军赖晓龙黄振海
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products