Supercharge Your Innovation With Domain-Expert AI Agents!

Trusted network connecting method based on IPsec

A network connection and trusted technology, applied in the field of IPsec-based trusted network connection, can solve the problems of not considering how to protect terminal security, unable to guarantee service credibility, etc., to achieve the effect of ensuring dynamic credibility

Inactive Publication Date: 2014-10-01
慧医可信大数据技术(武汉)有限公司
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At the same time, the starting point of the traditional Trusted Network Connection (TNC) is to ensure the security of the network, so this architecture does not consider how to protect the security of the terminal
Before the terminal accesses the network, in addition to providing its own platform credibility evidence, it should also have the ability to conduct a credibility assessment of the access network, otherwise the service obtained from the network cannot be guaranteed to be credible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted network connecting method based on IPsec

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0026] When the trusted terminal accesses the trusted server, the underlying communication channel uses the IPsec security channel. Before the life cycle of the security association (SA) used by the IPsec security channel ends, both parties need to conduct an IKE session to generate a new security association (SA).

[0027] This patent adds platform identity authentication and integrity verification to the process of IKE session connection establishment, so that when the security association (SA) is periodically updated through the IKE session between the terminal and the server, the platform identity authentication, integrity verification is also periodically performed. verify. Proceed as follows:

[0028] 1) The IKE client initiates a negotiation with the IKE server, and the first step is key negotiation.

[0029] 2) After the key negotiation between the IKE client and the IKE server is successful, the IKE server notifies the TNC server that an IKE negotiation request is c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of trusted network connecting (TNC) and particularly relates to a trusted network connecting method based on IPsec. An IKE session is carried out between a terminal and a server. When safety alliance (SA) is updated in a periodic mode, double-direction platform identity authentication and integrity verification are carried out in a periodic mode. Accordingly, the dynamic credibility of a terminal platform is guaranteed, the assess safety of an application server is guaranteed, and the service credibility obtained from a network of the terminal is guaranteed.

Description

technical field [0001] The invention belongs to the technical field of trusted network connection (TNC), in particular, the invention relates to an IPsec-based trusted network connection method. Background technique [0002] In the standard Trusted Network Connection (TNC) architecture, only platform identity authentication and integrity verification are performed on the terminal during the process of connecting the terminal to the network. Protect. The trusted status of the terminal platform may change after access, so it is necessary to increase the control mechanism of the entire access process to ensure the dynamic reliability of the terminal platform. [0003] At the same time, the starting point of the traditional Trusted Network Connection (TNC) is to ensure the security of the network, so this architecture does not consider how to protect the security of the terminal. Before connecting to the network, in addition to providing its own platform credibility evidence, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 刘毅周艳钢余发江肖霄冯振新
Owner 慧医可信大数据技术(武汉)有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More