Secure state evaluating method, network equipment and network system
A security status assessment and security status technology, applied in the network field, can solve the problems of unprotected terminal privacy and low terminal security, and achieve the effects of enhancing security, protecting privacy, and improving flexibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0069] In this embodiment, the requester A requests network services from the responder B, and after negotiation between the two parties, B selects an evaluator C trusted by both parties, and the evaluator C evaluates the security status information of the requester A. like figure 2 As shown, the specific implementation process of this embodiment includes the following steps:
[0070] Step 201: Requester A requests network services from Responder B, and at the same time, Requester A informs Responder B of the information of evaluators C, D, and E that he trusts;
[0071] Wherein, the network service is web browsing, or accessing a network domain managed by the responder B.
[0072] Wherein, the requester A may send the evaluator's name to the responder B in a list form, or may send the evaluator's IP address, MAC address, device identifier and other identifiers to the responder B.
[0073] Step 202: The responder B directly selects the evaluator C trusted by both parties ac...
Embodiment 2
[0083] In this embodiment, the requester A requests the responder B to establish communication, and after negotiation between the two parties, A selects an evaluator C trusted by both parties, and the evaluator C evaluates the security status information of the requester A. like image 3 As shown, the specific implementation process of this embodiment includes the following steps:
[0084] Step 301: same as step 201;
[0085] Step 302: The responder B informs the requester A of the evaluators C and D it trusts;
[0086] Step 303: Requester A selects evaluator C that both parties trust;
[0087] Step 304: same as step 203;
[0088] Step 305: same as step 204;
[0089] Step 306: Same as step 205.
[0090] Therefore, using the security state assessment method of the embodiment of the present invention can fully protect the privacy of the communication entity, enhance the security of the communication entity, and improve the flexibility of security state assessment.
[0091]...
Embodiment 3
[0102] In this embodiment, both the communication entity A and the communication entity B that need to communicate need to know the evaluation result of the other party, and both parties negotiate to determine that the evaluator of the communication entity A is the evaluator C, and the evaluator of the communication entity B is the evaluator D, by Evaluator C and evaluator D complete the evaluation of communication entity A and communication entity B respectively, and the two communication parties respond to each other's request according to the evaluation results given by the evaluator. like Figure 5 As shown, the specific implementation process of this embodiment includes the following steps:
[0103]Step 501: Communication entity A requests communication entity B to establish communication, and at the same time informs communication entity B of the information of evaluators C, D, and E trusted by communication entity A;
[0104] Wherein, the communication entity A may sen...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 