Platform identification implementation method and system suitable for trusted connection frameworks
An implementation method and platform technology, applied in the field of network security, can solve the problems of complex identification and implementation of TCA platform, reducing the overall operation performance of TCA, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0042] The present invention provides a method for implementing platform identification suitable for a trusted connection architecture, and the method includes the following steps:
[0043] Step 1) The TNC access point generates a random number N AC , and then send N to the TNC client AC and the request metric parameter Parms to the platform component of the access requester AR , where Parms AR Identify which platform components in the access requester and which integrity information needs to be measured.
[0044] Step 2) After the TNC client receives the information in step 1), perform the following steps:
[0045] Step 201) judge Parms AR Does the access requester match the Parms AR Platform configuration protection policy ProtPolicies for the identified information AR , if not, discard the information in step 1), otherwise execute steps 202) to 204);
[0046] Step 202) Parms AR Send to the corresponding integrity collector on the upper end of the TNC client, and the...
Embodiment 2
[0062] The present invention provides a method for implementing platform identification suitable for a trusted connection architecture, and the method includes the following steps:
[0063] Step 1) The TNC access point generates a random number N AC , and then send N to the TNC client AC and the request metric parameter Parms to the platform component of the access requester AR , where Parms AR Identify which platform components in the access requester and which integrity information needs to be measured.
[0064] Step 2) After the TNC client receives the information in step 1), perform the following steps:
[0065] Step 201) judge Parms AR Does the access requester match the Parms AR Platform configuration protection policy ProtPolicies for the identified information AR , if not, discard the information in step 1), otherwise execute steps 202) to 204);
[0066] Step 202) Parms AR Send to the corresponding integrity collector on the upper end of the TNC client, and the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

