Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, system and equipment for implementing transmission of trusted information

An information transfer and credible technology, applied in the field of communication, which can solve the problems of not conforming to the design method, small space, and no credible repair interaction process and data transfer method.

Inactive Publication Date: 2010-02-24
HUAWEI TECH CO LTD
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Based on the above-mentioned TNC architecture, the inventors found that in the implementation of the present invention, in the existing TNC architecture specification, in the EAP-TNC method defined by the IF-T standard document, the data message format is too simple, and the time sequence is also very rough
Moreover, in the existing standards, EAP-TNC does not provide the interaction process and data transfer method of communication scenarios required for trusted repair, trusted signature and other means to ensure network credibility, and is only applicable to a single access authentication scenario, and the Fragmentation Identification Bit Flags field and the protocol version Ver field in the EAP-TNC protocol data message have a total of 8 bits, and the Ver field is placed after the Flags field, which does not conform to the design method of protocol version The space for expansion and expansion is very small, and it is not suitable for the future development of trusted access technology to carry a variety of new data requirements
In addition, the current IF-T protocol does not specify how to pass authentication failure information and how to pass related trusted repair information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and equipment for implementing transmission of trusted information
  • Method, system and equipment for implementing transmission of trusted information
  • Method, system and equipment for implementing transmission of trusted information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] Based on the above-defined EAP-ETNC (enhanced EAP-TNC) protocol data message format, the following will discuss how to implement trusted information transfer based on the EAP-ETNC protocol, with Figure 5 The communication scenario diagram provided is an example, where AR is the access terminal, PEP is the policy enforcement point (or agent), PDP is the policy decision point (specifically, the access server), and TRS is the The repair server, TISA (Trusted Information Sign Agent, Trusted Information Signing Agency) is a server that issues trusted signatures. see Figure 6 , the content of the method is as follows:

[0065] 101: The access terminal AR provides a user name and requests access to the trusted network. The specific content is:

[0066] The access terminal AR requests access to the trusted network through the authentication information carrying protocol (IF-PEP, in the specific implementation, RADIUS / PANA / Diameter or their combination authentication method...

example 1

[0095] For ease of description, when EAP-ETNC is used in a trusted repair scenario with an intermediate agent, the successful trusted repair authentication is used as an example to illustrate, see Figure 10 , provides a schematic diagram of the sequence flow of successful trusted repair certification with an intermediate agent, the specific content is as follows:

[0096] 1. The repair server sends an EAP Request to the access terminal AR, wherein the STR is set to 1, the RCV is set to 1 in the EAP Request, the data field Data is empty, and the EAP Request is an empty message.

[0097] 2. After receiving the EAP Request, the access terminal AR replies with an EAP Response, wherein the RCV in the EAP Response is set to 1, the data field Data is empty, and the EAP Response is an empty message.

[0098] 3. The repair server sends an EAP Request to the access terminal AR, wherein the EAP Request is used to request a repair ID from the access terminal AR, the RCV in the EAP Reques...

example 2

[0109] For the sake of illustration, when EAP-ETNC is used in the application scenario of trusted signature authentication without an intermediate agent, the successful provision of trusted signatures is used as an example to illustrate, see Figure 11 , provides a schematic diagram of the sequence flow of successful trusted signature authentication without an intermediate agent, the specific content is as follows:

[0110] 1. The access server sends an EAP Request to the access terminal AR, wherein STR is set to 1, RCV&TSC is set to 1, and the data field Data is empty in the EAP Request.

[0111] 2. After receiving the EAP Request, the access terminal AR replies with an EAP Response, wherein the TSC in the EAP Response is set to 1, and the data field Data carries a trusted signature (TS, Trust Sign) or a trusted signature TS of the TNC client / service interface -IF-TNCCS.

[0112] 3. The access server receives the EAP Response, obtains the trusted signature of the access term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, a system and equipment for implementing the transmission of trusted information, and belongs to the field of communication. The method comprises that: a server sends an EAP-ETNC-based request message to an access terminal, and the request message is used for requesting information required by verification to the access terminal; the server receives an EAP-ETNC-based response message from the access terminal, and the response message carries the information required by the verification; and the server verifies the access terminal according to the information and sends an EAP-ETNC-based message carrying a verification result to the access terminal. The system comprises the access terminal and the server, wherein the server comprises an acquisition module and a processing module; and the terminal comprises a receiving module and a sending module. The method, the system and the equipment can successfully implement trusted access, trusted remediation and trusted signature information transmission through the provided EAP-ETNC, and can expand the EAP-ETNC to meet the requirement of bearing multiple kinds of novel data in the future development of the trusted access technology.

Description

technical field [0001] The present invention relates to the communication field, in particular to a method, system and equipment for realizing credible information transmission. Background technique [0002] The Trusted Computing Group (TCG), led by Compaq, Hewlett-Packard, IBM, Intel and Microsoft, is committed to enhancing the security of the computing platform architecture, developing open standards for highly trusted computing, and Released the Trusted Platform Module (Trusted Platform Module, TPM) specification, in order to provide an application support for the TPM released by the TCG, the TCG released the Trusted Network Connect (TNC) specification. Its main purpose is to realize the cooperative work of network access control by using the terminal technology provided by the trusted host. [0003] see figure 1 , is a schematic diagram of the TNC architecture, as shown in the figure, including: a network access requester (Access Requestor, AR), a policy enforcement po...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/56H04L29/06H04L1/00
Inventor 王健赵纪贾翔鹏张晶丁一兰厉益舟
Owner HUAWEI TECH CO LTD