A trusted network connection method for enhancing security
A network connection and security technology, applied in the field of trusted network connection with enhanced security, which can solve the problems of unequal evaluation of AIK certificate validity and platform integrity, inability to verify access requesters, and low security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0081] Since most of the existing networks are deployed using the TCG-TNC architecture, especially the wired network, the present invention is a trusted network connection architecture with enhanced security established on the TCG-TNC architecture. The present invention is mainly composed of a network access layer, an integrity evaluation layer and an integrity measurement layer, and four logical entities of an access requester, a policy enforcement point, an access authorizer and a policy manager can be distributed anywhere in the network. The access requester is also called requester, user station, etc., and the policy manager is also called authentication server, trusted server, background server, etc.
[0082]The network access layer is responsible for the two-way user authentication and key negotiation between the access requester and the access authorizer, the key negotiation between the access requester and the policy enforcement point, and the mutual access control betw...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com