Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A trusted network connection method based on three-element peer authentication

A ternary peer-to-peer and network connection technology, applied in the field of network security, can solve problems such as unequal AIK certificate validity and platform integrity evaluation, poor scalability, and inability to verify access requesters

Active Publication Date: 2008-08-13
CHINA IWNCOMM
View PDF0 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0019] The purpose of the present invention is to provide a trusted network connection method based on ternary peer-to-peer authentication, which solves the problem of poor scalability, complex key negotiation process, relatively low security, and the possibility that the access requester cannot verify the AIK in the background technology. Technical issue of unequal assessment of certificate validity and platform integrity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A trusted network connection method based on three-element peer authentication
  • A trusted network connection method based on three-element peer authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] The present invention is mainly composed of network access layer, integrity evaluation layer and integrity measurement layer. Access requester, access controller and policy manager are three logical entities in the present invention, which can be distributed anywhere in the network. The access requester is also called requester, user station, etc.; the access controller is also called authentication access controller, base station, access service unit, etc.; the policy manager is also called authentication server, trusted server, background server, etc.

[0066] The network access layer is responsible for two-way user authentication and key negotiation between the access requester and the access controller, and mutual access control between the access requester and the access controller based on the network user authentication result and the platform integrity evaluation result. The network access layer can adopt an access control method based on ternary peer-to-peer au...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a trusted network connection method based on ternary equal authentication, which pre-prepares a platform integrality information, prepares an integrality authentication request. A network access requester sends a access request to a network access controller, the network access controller starts a two-way authentication process of users, and user authentication service unit performs an equal authentication protocol. After the two-way user authentication is success, a TNC client-side, a TNC service side and a platform evaluate service unit execute a platform integrality evaluate by using the ternary equal authentication method. The network access requester and network access controller achieve an inter access control between the access requester and a access controller based on a recommended control terminal received respectively. The invention solves the technical problems in background technology that expandability is poor, the key arrangement process is complex, and the security is low and the platform integrality evaluate is unequal. The invention simplifies the key management and integrality authentication mechanism of trusted network connection, expands the range of applicability of trusted network connection.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a trusted network connection method based on ternary peer-to-peer authentication. Background technique [0002] With the development of informatization, the problems of malicious software such as viruses and worms are extremely prominent. There have been more than 35,000 kinds of malicious software, and more than 40 million computers are infected every year. To contain such attacks, it is necessary not only to solve the problem of secure transmission and data input checks, but also to start defense from the source, that is, from every terminal connected to the network. However, traditional security defense technologies have been unable to defend against a wide variety of malicious attacks. [0003] In response to this problem, the International Trusted Computing Organization TCG has specially formulated a network connection specification based on trusted co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3263H04L63/105H04L9/3247H04L63/20H04L41/0893H04L9/3234H04L63/0869H04L63/0876
Inventor 肖跃雷曹军赖晓龙黄振海
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products