Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure state evaluating method, network equipment and network system

A security status assessment and security status technology, applied in the network field, can solve the problems of unprotected terminal privacy and low terminal security, and achieve the effects of enhancing security, protecting privacy, and improving flexibility

Inactive Publication Date: 2009-11-18
HUAWEI TECH CO LTD
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, when the TNC architecture is used to evaluate the security status of the terminal, the privacy of the terminal is not protected, and the security of the terminal is low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure state evaluating method, network equipment and network system
  • Secure state evaluating method, network equipment and network system
  • Secure state evaluating method, network equipment and network system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] In this embodiment, the requester A requests network services from the responder B, and after negotiation between the two parties, B selects an evaluator C trusted by both parties, and the evaluator C evaluates the security status information of the requester A. like figure 2 As shown, the specific implementation process of this embodiment includes the following steps:

[0070] Step 201: Requester A requests network services from Responder B, and at the same time, Requester A informs Responder B of the information of evaluators C, D, and E that he trusts;

[0071] Wherein, the network service is web browsing, or accessing a network domain managed by the responder B.

[0072] Wherein, the requester A may send the evaluator's name to the responder B in a list form, or may send the evaluator's IP address, MAC address, device identifier and other identifiers to the responder B.

[0073] Step 202: The responder B directly selects the evaluator C trusted by both parties ac...

Embodiment 2

[0083] In this embodiment, the requester A requests the responder B to establish communication, and after negotiation between the two parties, A selects an evaluator C trusted by both parties, and the evaluator C evaluates the security status information of the requester A. like image 3 As shown, the specific implementation process of this embodiment includes the following steps:

[0084] Step 301: same as step 201;

[0085] Step 302: The responder B informs the requester A of the evaluators C and D it trusts;

[0086] Step 303: Requester A selects evaluator C that both parties trust;

[0087] Step 304: same as step 203;

[0088] Step 305: same as step 204;

[0089] Step 306: Same as step 205.

[0090] Therefore, using the security state assessment method of the embodiment of the present invention can fully protect the privacy of the communication entity, enhance the security of the communication entity, and improve the flexibility of security state assessment.

[0091]...

Embodiment 3

[0102] In this embodiment, both the communication entity A and the communication entity B that need to communicate need to know the evaluation result of the other party, and both parties negotiate to determine that the evaluator of the communication entity A is the evaluator C, and the evaluator of the communication entity B is the evaluator D, by Evaluator C and evaluator D complete the evaluation of communication entity A and communication entity B respectively, and the two communication parties respond to each other's request according to the evaluation results given by the evaluator. like Figure 5 As shown, the specific implementation process of this embodiment includes the following steps:

[0103]Step 501: Communication entity A requests communication entity B to establish communication, and at the same time informs communication entity B of the information of evaluators C, D, and E trusted by communication entity A;

[0104] Wherein, the communication entity A may sen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a secure state evaluating method, network equipment and a network system. The secure state evaluating method provided by the embodiment of the invention comprises the following steps: a response party receives a communication request from a requesting party and the information of an estimator trusted by the requesting party; according to the information of the estimator, the response party or the requesting party determines an estimator trusted by both the response party and the requesting party; the response party acquires a secure state evaluating result of the requesting party by the estimator, and the secure state evaluating result is acquired by the estimator according to the secure state information from the requesting party; and the response party responds to the communication request of the requesting party according to the evaluating result. The embodiment of the invention is applicable to evaluating the secure state of a communication entity.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a method for assessing a security state, network equipment and a network system. Background technique [0002] With the continuous development of network technology, the scale of the network is getting larger and larger, and the application of the network is becoming more and more extensive. At the same time, security problems appearing in the network are becoming more and more frequent, and the network security situation is becoming increasingly severe. Terminals such as user hosts, workstations, and servers are the starting point and end point of network data flow, and are also the source of network security incidents. A large number of unsafe terminals connected to the network will not only become the target of attack, but also may be used by attackers, becoming an intermediary for virus transmission and hacker attacks, which will seriously affect the normal operation of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L12/24
CPCH04L63/20
Inventor 贾科尹瀚任兰芳刘夫萍
Owner HUAWEI TECH CO LTD