Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for hierarchically connecting trusted networks

A credible and network technology, applied in the field of information security, can solve problems such as malicious code, network security risks, sensitive information leakage, etc., and achieve the effect of reducing network and management load

Active Publication Date: 2013-06-05
GUANGDONG KAMFU TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 2. Software upgrades may lead to network security risks
In existing schemes, the verification of integrity is performed by the IMV component inside the server. However, this component is usually implemented as a shared library file released by the software manufacturer, which may lead to unsafe terminals due to the server not updating the IMV component in time. Access to the network brings problems such as the spread of malicious code and the leakage of sensitive information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for hierarchically connecting trusted networks
  • Method and system for hierarchically connecting trusted networks
  • Method and system for hierarchically connecting trusted networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] The method of the present invention is realized by the following system. Including the network access system on the terminal platform or device, that is, the access terminal domain, the network connection control point in the trusted network control domain, the platform identity management service, platform integrity management service and user identity management service in the trusted network management domain . The network service domain corresponds to the specific network services provided by various network service providers in reality, such as portal websites and email services. see figure 1 , the network access system accesses various network services in the network service domain through the network connection control point of the trusted network control domain, and the trusted network management domain provides platform management services and user identity management for the connection process through the network connection control point Service and Integrit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for hierarchically connecting trusted networks. The method comprises the following steps: 1) a terminal platform is accessed to a trusted network control domain, and the trusted network management domain transmits a long-term platform identification PIK or AIK certificate to the verified terminal platform; 2) an arbitrary terminal is accessed to a network service domain, and a network connection control point calls platform identification management service and platform completeness management service in the trusted network management domain, and determines whether the terminal can be accessed to the network service domain or not; and 3) the terminal accesses any network service, and the network service determines whether the terminal accessesthe network service or not according to the returned completeness attribute. The system comprises an access terminal domain, the trusted network control domain, the trusted network management domain and the network service domain. By the method and the system, the network service can directly utilize the verification result when the terminal is accessed so as to reduce the network and management load caused by verification; and the access control point can monitor the terminal completeness in real time so as to ensure constant trust in the process.

Description

technical field [0001] The invention relates to a method and system for trusted network connection, in particular to a method and system for hierarchically connected trusted network. It belongs to the field of information security technology. Background technique [0002] With the expansion of the scale of the Internet and the deepening of its application, network security and supervision are facing huge challenges. One of the key methods to solve network security problems is to establish a cyberspace trust technology system to realize network identity management, authentication and authorization, and accountability across heterogeneous management domains. Recognition, platform trust. The cyberspace trust system mainly includes two aspects, one is the user identity trust system, and the other is the device platform trust system. With the user identity trust system, the user's behavior and activities on the Internet become manageable and controllable. From the user's login ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24
Inventor 于爱民秦宇赵世军汪丹李昊常德显
Owner GUANGDONG KAMFU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products