Reliable network management method based on TCPA/TCG reliable network connection

A network connection and network management technology, which is applied in the field of trusted network management, can solve problems such as loss of network management and control, administrator system work, and inability to guarantee agent security, etc., and achieve the effect of simplifying the implementation steps and preventing malicious attacks

Active Publication Date: 2009-01-14
CHINA IWNCOMM
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. The host where the proxy resides may attack the proxy, and the existing detection-based methods cannot guarantee the security of the proxy;
[0006] 2. The agent may also attack the resident host, such as the agent illegally accessing some private information of the resident host, etc. For such attacks, only intrusion detection technology is currently used for passive defense;
[0007] 3. Network management users completely trust the administrator system, which is not safe
Because the administrator system may be controlled by viruses, Trojan horses, etc., the administrator system does not work according to the wishes of network management users, thus losing the management and control of the network;
[0008] 4. The managed host completely trusts the manager system, which is also unsafe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reliable network management method based on TCPA/TCG reliable network connection
  • Reliable network management method based on TCPA/TCG reliable network connection
  • Reliable network management method based on TCPA/TCG reliable network connection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] see image 3 The specific implementation steps of the trusted network management method based on TCPA / TCG trusted network connection in Embodiment 1 of the present invention are:

[0050] 1. Installation and configuration of trusted management agent and trusted management system

[0051] Install and configure the trusted management agent residing in the managed host, install and configure the trusted management system residing in the management host, and the policy decision point PDP acts as the management host. The installation and configuration of the trusted management system is done by the network administrator. The installation and configuration of trusted management agents can be done by network administrators or by network users. When the installation and configuration of the trusted management agent is completed by the network user, the configuration file must be distributed by the network administrator and the content of the configuration file is unknown to t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a credible network managing method connected based on TCPA / TGG credible network. An credible managing agent and a credible managing system are respectively mounted and arranged on a managed host computer and a managing host computer and are validated to be locally credible, when the managed host computer and the managing host computer are not connected to a credible network, the computers are connected to the credible network based on a connecting method of TCPA / TGG credible network, then execute discrimination and key negotiating process of the credible managing agent and the credible managing system. When the managed host computer and the managing host computer do not complete user discrimination and the key negotiating process, the computers execute the user discrimination and the key negotiating process, then realize remote confidence of the credible managing agent and the credible managing system, finally execute network management. According to the invention, attack is initiatively defended, safety of a credible network management framework is enhanced, credible network management of distributed control and centralized management is realized.

Description

technical field [0001] The invention relates to a trusted network management method based on TCPA / TCG (Trusted Computing Platform Alliance / Trusted Computing Group) trusted network connection. Background technique [0002] The concept of network management is gradually recognized and familiar with the development of the Internet. In the early days, Internet access nodes were relatively small, and the structure was very simple, most of which were flat structures. Therefore, management related to network fault detection and performance monitoring was relatively simple and easy to implement. However, with the continuous development of the network, in the face of the continuous emergence of new network technologies and the continuous renovation of network products, it is becoming more and more difficult to plan and expand the network. How to maximize the effectiveness of each component of the network and how to maintain good reliability of the network And higher efficiency, thes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
CPCH04L63/0823H04L63/105H04L63/20H04L41/28H04L63/0876
Inventor 肖跃雷曹军赖晓龙黄振海
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products