Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Trusted network access method and system for mobile terminal

A mobile terminal and network access technology, applied in wireless communication, electrical components, security devices, etc., can solve problems such as stealing and destroying companies, and achieve the effect of guaranteeing network resources

Inactive Publication Date: 2012-10-17
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When they use these mobile devices to connect to the company network, they may be used by a third party to steal or destroy the company's secret resources, and these malicious software may also be spread to the company network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted network access method and system for mobile terminal
  • Trusted network access method and system for mobile terminal
  • Trusted network access method and system for mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The mobile terminal trusted network access technology of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0030] like figure 1 As shown, the mobile terminal trusted network access system includes a mobile terminal requesting access, an access control server and an access policy server.

[0031] 1. The mobile terminal (AR, Access Requestor) that issues the access request is connected to the PEP through wireless. It is usually installed with a common network access terminal to support general network access methods, such as 802.1x, and a complete AR is deployed on the AR. Integrity Measurement Collector Interface (IMC, Integrity Measurement Collector Interface), Trusted Network Connect Client (TNCC, Trusted Network Connect Client) and Network Access Requestor (NAR, Network Access Requestor).

[0032]2. Network access devices (PEP, Policy Enforcement Point), such as APs, VPN gateways, etc., need to support commonly u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a trusted network access method and a trusted network access system for a mobile terminal, and belongs to the technical field of trusted network access. The method comprises the following steps that: 1) the mobile terminal loads an integrity measurement collector and detects the integrity of the integrity measurement collector, and a policy decision point loads an integrity measurement verifier and detects the integrity of the integrity measurement verifier; 2) the mobile terminal transmits a network access request to a policy enforcement point; 3) after receiving the network access request, the policy enforcement point transmits a network access judgment request to the policy decision point, and authenticates the user identity of the mobile terminal; 4) after the user identity passes authentication, platform identity authentication is performed between the policy decision point and the mobile terminal, the policy decision point and the mobile terminal mutually authenticate system integrity, and a platform trust relationship between the policy decision point and the mobile terminal is established; and 7) the policy decision point transmits a suggestion indicating whether to access the policy enforcement point according to the platform trust relationship, and the policy enforcement point authorizes network access permission to the mobile terminal according to the suggestion. By the method and the system, network resources can be well protected.

Description

technical field [0001] The invention belongs to the technical field of trusted network access, and in particular relates to an access method and system for a mobile terminal in a trusted network. Background technique [0002] With the continuous update and development of mobile devices and mobile networks, mobile phones have become an indispensable part of modern human life. The rapid growth of mobile networks has brought many new security challenges while introducing many new concepts and technologies. For example, many employees inadvertently download some malicious software (Trojan horses, viruses, etc.) while surfing the Internet on mobile devices (cell phones, PDAs, tablets, laptops, etc.) at home. When they use these mobile devices to connect to the company network, they may be used by a third party to steal or destroy the company's secret resources, and these malicious software may also be spread to the company network. Therefore, when a mobile terminal requests net...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/08H04W12/10
Inventor 谷雅聪冯登国苏璞睿杨轶
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products