Method, system and equipment for implementing transmission of trusted information
An information transfer and credible technology, applied in the field of communication, which can solve the problems of not conforming to the design method, small space, and no credible repair interaction process and data transfer method.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0064] Based on the above-defined EAP-ETNC (enhanced EAP-TNC) protocol data message format, the following will discuss how to implement trusted information transfer based on the EAP-ETNC protocol, with Figure 5 The communication scenario diagram provided is an example, where AR is the access terminal, PEP is the policy enforcement point (or agent), PDP is the policy decision point (specifically, the access server), and TRS is the The repair server, TISA (Trusted Information Sign Agent, Trusted Information Signing Agency) is a server that issues trusted signatures. see Figure 6 , the content of the method is as follows:
[0065] 101: The access terminal AR provides a user name and requests access to the trusted network. The specific content is:
[0066] The access terminal AR requests access to the trusted network through the authentication information carrying protocol (IF-PEP, in the specific implementation, RADIUS / PANA / Diameter or their combination authentication method...
example 1
[0095] For ease of description, when EAP-ETNC is used in a trusted repair scenario with an intermediate agent, the successful trusted repair authentication is used as an example to illustrate, see Figure 10 , provides a schematic diagram of the sequence flow of successful trusted repair certification with an intermediate agent, the specific content is as follows:
[0096] 1. The repair server sends an EAP Request to the access terminal AR, wherein the STR is set to 1, the RCV is set to 1 in the EAP Request, the data field Data is empty, and the EAP Request is an empty message.
[0097] 2. After receiving the EAP Request, the access terminal AR replies with an EAP Response, wherein the RCV in the EAP Response is set to 1, the data field Data is empty, and the EAP Response is an empty message.
[0098] 3. The repair server sends an EAP Request to the access terminal AR, wherein the EAP Request is used to request a repair ID from the access terminal AR, the RCV in the EAP Reques...
example 2
[0109] For the sake of illustration, when EAP-ETNC is used in the application scenario of trusted signature authentication without an intermediate agent, the successful provision of trusted signatures is used as an example to illustrate, see Figure 11 , provides a schematic diagram of the sequence flow of successful trusted signature authentication without an intermediate agent, the specific content is as follows:
[0110] 1. The access server sends an EAP Request to the access terminal AR, wherein STR is set to 1, RCV&TSC is set to 1, and the data field Data is empty in the EAP Request.
[0111] 2. After receiving the EAP Request, the access terminal AR replies with an EAP Response, wherein the TSC in the EAP Response is set to 1, and the data field Data carries a trusted signature (TS, Trust Sign) or a trusted signature TS of the TNC client / service interface -IF-TNCCS.
[0112] 3. The access server receives the EAP Response, obtains the trusted signature of the access term...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 