Trusted platform connection method

A connection method and platform technology, applied in the field of computer security, can solve problems such as unguaranteed reliability of access platform behavior, unknown vulnerabilities, and unguaranteed reliability of connection platform

Inactive Publication Date: 2019-03-01
BEIJING KEXIN HUATAI INFORMATION TECH
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The Windows system has won the favor of users all over the world with its intuitive, concise and generous interface, but there are also some problems in the Windows system itself, such as the opacity of Windows itself, which leads to the emergence of unknown vulnerabilities, etc. The ransomware incident that broke out in May is even better.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted platform connection method
  • Trusted platform connection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] This embodiment proposes a trusted platform connection system, such as figure 1 As shown, it includes an access requester, an access controller, and a trusted third party, wherein the access requester and the access controller perform two-way identity authentication and trusted platform evaluation through the trusted third party, and the system specifically include:

[0036] (1) Access requester

[0037] The functions of the access requester mainly include: initiating a network access request, realizing two-way identity authentication with the access controller; collecting the integrity of the Windows access terminal, generating an integrity measurement report, and completing the two-way platform integrity evaluation with the access controller ; At the same time, collect Windows application behavior, generate a corresponding measurement report, and send it to the policy manager.

[0038] The access requester includes the following functional modules: Windows access re...

Embodiment 2

[0068] Based on a trusted platform connection system proposed in Embodiment 1, this embodiment describes its software system architecture level, the system includes a network access control layer, a trusted platform evaluation layer, an integrity measurement layer and a behavior collection layer , the above system architecture layer specifically includes:

[0069] (1) Network access control layer

[0070] The functions of the network access control layer mainly include the two-way identity authentication of the Windows access requester and the Windows access controller with the help of the trusted authentication center, and the access control is realized according to the authentication result and the evaluation strategy of the evaluation layer.

[0071] (2) Trusted platform evaluation layer

[0072] The trusted platform evaluation layer mainly realizes platform integrity evaluation and verification of Windows access terminals and server access points. A trusted certificate a...

Embodiment 3

[0078] Based on the trusted platform connection system in Embodiment 1 and the system software architecture in Embodiment 2, this embodiment proposes a trusted platform connection method, such as figure 2 As shown, it includes three major steps of user identity authentication, platform security authentication, and network connection control according to the authentication result. The detailed flow of the method is as follows:

[0079] 1) Connection preparation: Before the connection starts, the Windows terminal and the server access end perform integrity collection by binding TPCM-related interfaces;

[0080] 2) The user sends a network access request to the gateway;

[0081] 3) The user and the gateway perform user identification. Based on the trusted third-party certification center through the key negotiation protocol, the communication key Key is established. After the communication key is established, the user encrypts the relevant information U(id, password) through th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a trusted platform connection method. The trusted platform connection method comprises the steps of user identity authentication, platform security identification, and networkconnection controlling according to an authentication result and so on; by using a trusted network connection architecture, user identity authentication, two-way platform authentication and platformintegrity authentication of an access network in a Windows environment are realized combined with user behavior analysis; a Windows server is used to perform trusted authentication on a behavior of anaccess terminal, and whether to allow a secure network request to access or not is determined according to the authentication result; therefore, a trusted network connection is realized.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a trusted platform connection method. Background technique [0002] At present, in the field of personal office desktop operating system, although it is challenged by more and more new products, Windows system still occupies a dominant position, and its market share is as high as 91.41%. Apple's Mac OS X share is 6.32%, while Linux share is only 2.27%. [0003] The Windows system has won the favor of users all over the world with its intuitive, concise, and generous interface, but there are also some problems in the Windows system itself, such as the opacity of Windows itself, which leads to the emergence of unknown vulnerabilities, etc. The ransomware incident that broke out in May is even better. illustration. In addition, when Windows connects to the network, it mainly adopts the TNC connection architecture. Because TNC adopts a one-way platform integrity verification archit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L63/0823H04L63/0869H04L67/141
Inventor 孙瑜洪宇王大海夏攀王涛王强
Owner BEIJING KEXIN HUATAI INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products