Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Implementation method of ternary-equally recognizing credible network connecting architecture

A network connection and ternary peering technology, applied in the field of identifying trusted network connection architectures, can solve the problems of different TNC architecture implementation methods and so on

Active Publication Date: 2009-09-09
CHINA IWNCOMM
View PDF1 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But due to figure 2 The TePA-based TNC architecture shown with figure 1 The TCG-TNC architecture shown is quite different, so the specific implementation methods of the TePA-based TNC architecture are also different

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method of ternary-equally recognizing credible network connecting architecture
  • Implementation method of ternary-equally recognizing credible network connecting architecture
  • Implementation method of ternary-equally recognizing credible network connecting architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The present invention provides a method for implementing a trusted network connection framework for ternary peer-to-peer authentication. The method includes the following steps:

[0060] 1) Establish a trusted network connection architecture for ternary peer-to-peer authentication by defining an interface, and its specific implementation method is:

[0061] 1.1) The specific implementation method of IF-TNT and IF-APS:

[0062] The user authentication protocol defined in IF-TNT and IF-APS can use a ternary peer-to-peer authentication protocol based on symmetric keys and asymmetric keys, such as the WAI protocol in the Chinese wireless LAN standard.

[0063] The network transmission protocol defined in IF-TNT and IF-APS can be: the protocol data encapsulation packet can adopt the same or similar protocol data encapsulation packet as EAP, but the processing of the protocol data encapsulation packet is different from that of EAP, and the protocol data encapsulation packet ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an implementation method of a credible network ternary-equally recognizing connecting architecture, which comprises the following steps: firstly, building the credible network ternary-equally recognizing connecting architecture by a definition interface; and secondly, realizing the credible network connection of the credible network ternary-equally recognizing connecting architecture. The invention provides the implementation method of building terminal reliability, realizing the credible network connection of terminals, and realizing the creditability among the terminals and credible management to the terminals.

Description

technical field [0001] The invention relates to a method for realizing a trusted network connection framework for ternary peer-to-peer authentication. Background technique [0002] With the development of informatization, the problems of malicious software such as viruses and worms are extremely prominent. There have been more than 35,000 kinds of malicious software, and more than 40 million computers are infected every year. To contain this kind of attack, not only by solving security transmission and data input inspection, but also starting defense from the source, that is, from every terminal connected to the network. However, traditional security defense technologies have been unable to defend against a wide variety of malicious attacks. [0003] The International Trusted Computing Group (Trusted Computing Group, TCG) specially formulated a network connection specification based on trusted computing technology - Trusted Network Connect (TNC), abbreviated as TCG-TNC. I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24G06F21/00
CPCH04L63/08H04L63/105H04L63/20H04L63/0876
Inventor 肖跃雷曹军葛莉黄振海
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products