Unlock instant, AI-driven research and patent intelligence for your innovation.

Platform identification realizing method suitable for trusted network connection framework of trusted computing group (TCG)

A network connection and implementation method technology, applied in the field of network security, can solve the problems of low efficiency of platform authentication implementation methods

Active Publication Date: 2013-01-16
CHINA IWNCOMM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] According to the platform identification implementation method of the TCG trusted network connection architecture described above, each IF-TNCCS batch sent from the TNC server to the TNC client may contain at least one integrity measurement verifier generated by the upper end of the TNC server The corresponding random number and the integrity measurement request parameters of the access requester, and each IF-TNCCS batch sent from the TNC client to the TNC server may contain the corresponding Integrity reporting of access requesters, thus making platform authentication implementations of the TCG Trusted Network Connection framework less efficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Platform identification realizing method suitable for trusted network connection framework of trusted computing group (TCG)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] A detailed description of a platform identification implementation method suitable for the TCG trusted network connection architecture:

[0049] Step 1) When the TNC client initiates platform authentication, the TNC client generates an IF-TNCCS batch and sends the IF-TNCCS batch to the TNC server. The IF-TNCCS batch contains zero or at least one IF-TNCCS message carrying IF-M messages generated by the TNC client, wherein each IF-TNCCS message carrying IF-M messages only carries one An IF-M message sent by an integrity metric collector;

[0050] Step 2) When the TNC server initiates platform authentication, the TNC server generates an IF-TNCCS batch and sends the IF-TNCCS batch to the TNC client. The IF-TNCCS batch contains zero or at least one IF-TNCCS message carrying IF-M messages generated by the TNC server, wherein each IF-TNCCS message carrying IF-M messages only carries one IF-TNCCS message carried by the TNC server. An IF-M message sent by an integrity metric v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for implementing platform authentication applicable to trusted network connect architecture of the Trusted Computing Group (TCG), a TNC client and a TNC server. The method comprises: 1) the TNC client generating a first IF-TNCCS batch, and sending the first IF-TNCCS batch to the TNC server; 2) the TNC server generating a second IF-TNCCS batch, and sending the second IF-TNCCS batch to the TNC client; 3) if the second IF-TNCCS batch comprises TNC server action recommendation, the TNC client ending platform authentication with the TNC server; and otherwise, generating a third IF-TNCCS batch after processing the information in 2), and sending the third IF-TNCCS batch to the TNC server; 4) if the TNC server generates the TNC server action recommendation after processing the information in 3), the TNC server generating a fourth IF-TNCCS batch after processing the information in 3), and sending the fourth IF-TNCCS batch to the TNC client; and 5) ending the platform authentication between the TNC client and the TNC server.

Description

technical field [0001] The invention belongs to the technical field of network security, and relates to a method for realizing platform identification suitable for a TCG trusted network connection framework. Background technique [0002] With the development of informatization, the problems of malicious software such as viruses and worms are extremely prominent. There have been more than 35,000 kinds of malicious software, and more than 40 million computers are infected every year. To contain this kind of attack, not only by solving security transmission and data input inspection, but also starting defense from the source, that is, from every terminal connected to the network. However, traditional security defense technologies have been unable to defend against a wide variety of malicious attacks. [0003] TCG (Trusted Computing Group, International Trusted Computing Group) has specially formulated a network connection specification based on trusted computing technology - ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L2209/127H04L9/32H04L63/126H04L9/0877H04L63/00H04L63/0892
Inventor 肖跃雷曹军王珂张国强
Owner CHINA IWNCOMM