Unlock instant, AI-driven research and patent intelligence for your innovation.

Platform identification implementation method and system suitable for trusted connection frameworks

An implementation method and platform technology, applied in the field of network security, can solve the problems of complex identification and implementation of TCA platform, reducing the overall operation performance of TCA, etc.

Active Publication Date: 2010-08-04
CHINA IWNCOMM
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in each round of the platform authentication protocol, since the TNC client needs to verify the multiple platform signatures of the access controller and the evaluation policy server needs to verify the validity of the platform identity certificates corresponding to these platform signatures, or the TNC access point needs to Verify the multiple platform signatures of the access requester and the evaluation policy server needs to verify the validity of the platform identity certificates corresponding to these platform signatures, or both, where the platform signature can be the platform identity certification key (Attestation Identity Key, AIK ) signature, the platform identity certificate can be an AIK certificate, which makes the implementation of TCA platform identification more complicated, thereby reducing the overall operating performance of TCA

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Platform identification implementation method and system suitable for trusted connection frameworks
  • Platform identification implementation method and system suitable for trusted connection frameworks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] The present invention provides a method for implementing platform identification suitable for a trusted connection architecture, and the method includes the following steps:

[0043] Step 1) The TNC access point generates a random number N AC , and then send N to the TNC client AC and the request metric parameter Parms to the platform component of the access requester AR , where Parms AR Identify which platform components in the access requester and which integrity information needs to be measured.

[0044] Step 2) After the TNC client receives the information in step 1), perform the following steps:

[0045] Step 201) judge Parms AR Does the access requester match the Parms AR Platform configuration protection policy ProtPolicies for the identified information AR , if not, discard the information in step 1), otherwise execute steps 202) to 204);

[0046] Step 202) Parms AR Send to the corresponding integrity collector on the upper end of the TNC client, and the...

Embodiment 2

[0062] The present invention provides a method for implementing platform identification suitable for a trusted connection architecture, and the method includes the following steps:

[0063] Step 1) The TNC access point generates a random number N AC , and then send N to the TNC client AC and the request metric parameter Parms to the platform component of the access requester AR , where Parms AR Identify which platform components in the access requester and which integrity information needs to be measured.

[0064] Step 2) After the TNC client receives the information in step 1), perform the following steps:

[0065] Step 201) judge Parms AR Does the access requester match the Parms AR Platform configuration protection policy ProtPolicies for the identified information AR , if not, discard the information in step 1), otherwise execute steps 202) to 204);

[0066] Step 202) Parms AR Send to the corresponding integrity collector on the upper end of the TNC client, and the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a platform identification implementation method and a system suitable for trusted connection frameworks. The method comprises the following steps: 1) transmitting a platform component request measurement parameter for a visit requester to a TNC client by a TNC access point; 2) transmitting a platform identification letter of the visit requester to the TNC access point; 3) transmitting the platform identification letter of the visit requester to an evaluation strategy servant; 4) transmitting a verification result of the platform identification letter of the visit requester to the TNC access point; 5) verifying the user signature at the strategy manager, if verification is not successfully, discarding information in step 4; and 6) and verifying the platform signature, if verification is unsuccessfully, discarding information in step 5, and if verification is successfully, verifying the user signature at the strategy manager. The platform identification implementation method effectively reduces the complexity for realizing TCA platform identification, enhances the integral operating performance of TCA, and is suitable for TCA.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a method and system for realizing platform identification suitable for a trusted connection architecture. Background technique [0002] With the development of informatization, the problems of malicious software such as viruses and worms are extremely prominent. There have been more than 35,000 kinds of malicious software, and more than 40 million computers are infected every year. To contain this kind of attack, not only by solving security transmission and data input inspection, but also starting defense from the source, that is, from every terminal connected to the network. However, traditional security defense technologies have been unable to defend against a wide variety of malicious attacks. [0003] In response to this problem, the International Trusted Computing Group (TCG) has specially formulated a network connection specification based on trusted...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0823H04L2209/127G06F21/57H04L63/20H04L9/3263
Inventor 肖跃雷曹军黄振海王珂张国强
Owner CHINA IWNCOMM