Reliable network access framework

A network access and network connection technology, which is applied in the direction of network connection, data exchange network, data exchange through path configuration, etc., to achieve the effects of centralized management and distribution, high security, and centralized verification

Inactive Publication Date: 2008-03-05
BEIJING UNIV OF TECH
View PDF0 Cites 84 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the information security measures in the industry are mainly the "old three things" such as plugging loop

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reliable network access framework

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] information flow

[0067] A complete information flow of the trusted network connection architecture is shown in Figure 2.

[0068] The information flow of the trusted network connection architecture is:

[0069] (1) The network access requester initiates an access request to the network access controller;

[0070] (2) After receiving the access request from the network access requester, the network access controller implements two-way user identity authentication between the access requester and the access controller with the network access requester and the authentication policy server. In the process of user identity authentication, the policy manager acts as a trusted third party, and a master key is negotiated between the access requester and the access controller. The access requester and the access controller use this master key to negotiate a session key between them. At the same time, the access requester and the access controller control the local port acco...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Frame of the invention includes three entities: accessing requestor, accessing controller, and strategy manager. The strategy manager manages the accessing requestor and the accessing controller as well as implements bidirectional user ID authentication between them, and evaluates integrality of platform. Based on decision made from the strategy manager, the accessing requestor and the accessing controller control local ports. Before terminal is connected to network, trusty network connection architecture (TNCA) measures state of platform. Based on secure protocol of trusty third party, the invention implements the said authentication and evaluation of platform so as to guarantee security of TNCA. Introducing strategy manager simplifies key management of the architecture, raises extensibility of the architecture. Features are: higher security for evaluating integrality of platform, centralized verifying integrality, and higher universality.

Description

technical field [0001] The invention relates to a computer network frame, a gateway, a network communication specification, and a computer program, in particular to a trusted network access frame and its core equipment, belonging to the field of information security. Background technique [0002] With the gradual development of informatization, the impact of computer networks on human beings has become more and more profound, and information security has become an important social issue. When talking about information security, people often think of resisting attacks and invasions from viruses and hackers outside the computer, and then think of antivirus software and "firewalls", but they often ignore attacks from inside the network. According to the statistics of the international security community, 80% of the attacks and damages suffered by various computer networks come from inside. At present, the information security measures in the industry are mainly the "old three ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/56H04L12/28H04L12/66
CPCH04L63/20H04L63/0876H04L63/105H04L63/0823
Inventor 沈昌祥张兴于昇祝璐周明周艺华
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products