Communication method, and security policy negotiation method and system for supporting trusted network connect

A technology for security policy and network access, applied in the field of communication, which can solve the problems that policy interaction and communication solutions have not yet been proposed, and the end-to-end secure communication of heterogeneous cross-domain security policy interaction cannot be realized.

Active Publication Date: 2011-10-12
ZTE CORP
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] At present, the policy interaction and communication scheme between the unified security policy framework and the existing TNC network has not been...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication method, and security policy negotiation method and system for supporting trusted network connect
  • Communication method, and security policy negotiation method and system for supporting trusted network connect
  • Communication method, and security policy negotiation method and system for supporting trusted network connect

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] An object of the present invention is to provide a method for communication between a local network (hereinafter, unless otherwise specified, a local network refers to an untrusted network) and a trusted network, so as to realize cross-domain, heterogeneous end-to-end secure communication, Ensure the security of end-to-end communication.

[0038] To achieve the above object, the present invention adopts the following technical solutions:

[0039] The local network supports the IF-FTNC (Federated TNC) interface issued by TCG (Trusted Computing Group, Trusted Computing Organization) for cross-domain collaborative trusted network access;

[0040] The policy negotiation between the TNC network and the local network is realized through the IF-FTNC interface.

[0041]Wherein, if the local network supports the IF-FTNC interface, the TNC network can directly access the local network, and before performing communication, it first conducts policy negotiation with the local netwo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a communication method, a security policy negotiation method and system for supporting trusted network connect. The communication method is used for the communication between a trusted network connect (TNC) network and a local network for a non-trusted network connect network. The communication method comprises the following steps: the local network supports a cross-domain interface for federated trusted network connect (IF-FTNC) interface; when the TNC network requests to access a communication entity of the local network, the local network performs policy negotiation with the TNC network through the IF-FTNC interface; and if a negotiation result of the policy negotiation allows communication, the TNC network directly communicates with the local network. According to the communication method disclosed by the invention, the problems of heterogeneous cross-domain security policy negotiation and communication are solved, and the policy interaction and communication of the non-trusted network and the TNC network are realized.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to a communication method, a security policy negotiation method and system supporting trusted network access. Background technique [0002] Convergence is the trend of network development, and a solution based on security policies is an inevitable choice for future network security management. With the development of network convergence, business diversity and equipment complexity make the security of the entire network more and more complicated. Therefore, complex manual configuration can no longer meet the needs of network development, and solutions based on security policies can provide network security management methods that optimize efficiency, unify security, and facilitate operation. [0003] The purpose of the unified security policy framework is to implement unified management of security devices on the entire network based on policies, and realize the colla...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24H04L9/00
Inventor 陈书义颜正清高峰李媛
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products