CN102740296A - Trusted network access method and system for mobile terminal - Google Patents

Trusted network access method and system for mobile terminal Download PDF

Info

Publication number
CN102740296A
CN102740296A CN201210222083XA CN201210222083A CN102740296A CN 102740296 A CN102740296 A CN 102740296A CN 201210222083X A CN201210222083X A CN 201210222083XA CN 201210222083 A CN201210222083 A CN 201210222083A CN 102740296 A CN102740296 A CN 102740296A
Authority
CN
China
Prior art keywords
integrity
portable terminal
access strategy
server
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210222083XA
Other languages
Chinese (zh)
Inventor
谷雅聪
冯登国
苏璞睿
杨轶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Software of CAS
Original Assignee
Institute of Software of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Software of CAS filed Critical Institute of Software of CAS
Priority to CN201210222083XA priority Critical patent/CN102740296A/en
Publication of CN102740296A publication Critical patent/CN102740296A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a trusted network access method and a trusted network access system for a mobile terminal, and belongs to the technical field of trusted network access. The method comprises the following steps that: 1) the mobile terminal loads an integrity measurement collector and detects the integrity of the integrity measurement collector, and a policy decision point loads an integrity measurement verifier and detects the integrity of the integrity measurement verifier; 2) the mobile terminal transmits a network access request to a policy enforcement point; 3) after receiving the network access request, the policy enforcement point transmits a network access judgment request to the policy decision point, and authenticates the user identity of the mobile terminal; 4) after the user identity passes authentication, platform identity authentication is performed between the policy decision point and the mobile terminal, the policy decision point and the mobile terminal mutually authenticate system integrity, and a platform trust relationship between the policy decision point and the mobile terminal is established; and 7) the policy decision point transmits a suggestion indicating whether to access the policy enforcement point according to the platform trust relationship, and the policy enforcement point authorizes network access permission to the mobile terminal according to the suggestion. By the method and the system, network resources can be well protected.

Description

A kind of portable terminal trustable network cut-in method and system
Technical field
The invention belongs to trustable network access technology field, relate in particular to cut-in method and the connecting system of a kind of portable terminal in trustable network.
Background technology
Along with mobile device, mobile network's continual renovation and development, mobile phone has become the indispensable part of the human modern life.Mobile network's quick growth has also brought a lot of new security challenges when having introduced a lot of new notions and technology.For example many employees are in and have downloaded some Malwares (wooden horse, virus etc.) when using mobile device (mobile phone, PDA, panel computer, notebook computer etc.) online accidentally.When they possibly are used to steal or the secret resource of dilapidated company during with these mobile device Connected Corp. network by the third party, these Malwares also might be transmitted in company's network simultaneously.Therefore; When the mobile terminal request network insertion; The network insertion control appliance also hopes to verify user's platform identity except the terminal is carried out traditional authenticating user identification, confirms to operate in the protection that terminal on the specific platform has received certain safe practice; Thereby set up certain of user is trusted, receive the threat of infected with malware to prevent portable terminal that the network insertion control appliance contains Malware because of access; Similarly, the user also hopes to verify the platform identity of network insertion control appliance, receives threats such as infected with malware, leakage privacy data to prevent the network insertion control appliance that contains Malware because of access.Therefore, realize that the platform authentication between the machine to machine is necessary.
Simultaneously the network insertion control appliance hopes to verify whether the virus base, system mend, operating software integrity check value etc. of user's operating system version, antivirus software reach safety requirements; Thereby set up certain trusting relationship; Believe that the portable terminal that request inserts operates in the appropriate environments really, does not receive the attack of virus and wooden horse.
Therefore, the access of control portable terminal in trusted networks, the safety issue that the guarding network office brings becomes the previous problem demanding prompt solution of order.
Summary of the invention
To the technical problem that exists in the prior art, the purpose of this invention is to provide the method for security verification when portable terminal inserts in a kind of trustable network, access strategy decision and implementation strategy.This method is carried out the policy validation of running of mobile terminal situation; The operation conditions of guaranteeing the terminal of access network meets the regulation of relevant operation conditions strategy in the network access policies, and limits the abnormal portable terminal of operation conditions selectively and only just can conduct interviews after normal recovering.
According to above purpose, realize that a concrete scheme of the present invention is: have three typical entities of participating in---portable terminal, accessing control server and access strategy server that request inserts at least.
The processing procedure of portable terminal trustable network access technology comprises the steps:
1. portable terminal sends the network insertion request to accessing control server;
2. after accessing control server is received the network insertion request, send the network insertion decision request to the access strategy server;
3. after the access strategy server is received decision request, checking mobile terminal user identity (conventional authentication methods such as user name, password);
4. after the mobile terminal user authentication is passed through, begin to carry out the platform authentication between access strategy server and the portable terminal;
5. portable terminal and access strategy server send message each other, verify both sides' system integrity each other.The access strategy server sends system integrity checking request to portable terminal; Request content comprises operating system version, the system mend situation moved on the portable terminal, whether Malware etc. is arranged; The system integrity that the result who returns according to portable terminal measures portable terminal is set up the trust of access strategy server for portable terminal thus; Same; Portable terminal sends system integrity checking request to the access strategy server; Request content comprises operating system version, system mend situation etc.; The result who returns according to the access strategy server measures its system integrity, sets up the trust of portable terminal for the access strategy server thus.After the verification system integrality finishes each other, just set up portable terminal and access strategy server both sides' platform trusting relationship.
6. the access strategy server sends the suggestion that whether inserts according to checking result (the platform trusting relationship of promptly setting up) to accessing control server, and accessing control server advises that according to this permission, refusal or part are authorized the mobile terminal network access rights.
Before portable terminal sent the network insertion request, deployment was connected the integrality (prevent to be written into the IMC that suffers that Malware is forged, distorted, guarantee the credibility of IMC) that client is written into IMC and detects IMC with the trustable network of portable terminal; Same, the credible Connection Service device end of access strategy server loads integrity verification person IMV, and checking integrity verification person's integrality (adopt the modes such as hashed value of verification IMV, guarantee that IMV is not by malicious modification).
The method of said portable terminal and access strategy server authentication both sides' system integrity is:
Integrality gatherer on A, the portable terminal reports to the trustable network connection client TNCC on the portable terminal with the configuring condition (like type of message, information gathering ability and the scope etc. that IMC supported) of IMC self;
Integrity verification person on B, the access strategy server reports to the credible Connection Service device end TNCS on the access strategy server with the configuring condition (like type of message, measure information ability and the scope etc. that IMV supported) of IMV self;
C, credible Connection Service device end TNCS are with the information of the integrality gatherer IMC person IMV that issues the integrity verification; The integrality of integrity verification person IMV checking integrality gatherer IMC; And through credible Connection Service device end and integrality gatherer IMC switching plane authentication message, a series of integrity value of the access strategy server that the concrete request of the collection access strategy server system integrality that a series of integrity value (like operating system version and patch information etc.) of this portable terminal that the request of collecting is collected according to integrality that the concrete request (operating system version of collecting portable terminal like request with patch information etc.), IMC that both sides' interactive messages comprises the collection mobile terminal system integrality that IMV sends to IMC returned to IMV, IMC are sent to IMV, the collection according to integrality that IMV returns to IMC ask to collect;
D. integrity verification person IMV is according to a series of integrity value about portable terminal of integrality gatherer IMC collection, and whether the system integrity of checking portable terminal is to allowing the portable terminal access to make IMV action suggestion; The a series of system integrities about the access strategy server that integrality gatherer IMC collects according to integrity verification person IMV confirm whether the access strategy server can trust.
Integrity verification person IMV sends IMV action suggestion to credible Connection Service device end TNCS; IMV action suggestion can be " allowing to insert ", " allowing to insert the subnetwork resource ", " refusal inserts; isolate portable terminal " etc.; TNCS forms TNCS access suggestion according to IMV action suggestion and the security strategy of self, and carries out TNCS and insert suggestion, the completion access process.
The present invention also provides the connecting system of portable terminal in a kind of trustable network, comprises portable terminal AR, accessing control server PEP and access strategy server PDP, and portable terminal sends the network insertion request; The platform identity and the completeness of platform of access strategy server authentication portable terminal judge whether the running status of portable terminal satisfies the network insertion strategy; Accessing control server allows, refuses according to the judged result of access strategy server or part is authorized the mobile terminal network access rights.
Said portable terminal comprises integrality gatherer (IMC; Integrity Measurement Collector Interface), trustable network connects client (TNCC; Trusted Network Connect Client) and network insertion requestor (NAR, Network Access Requestor); Trustable network connects client and is connected with the access strategy server, receives the integrity value of integrality gatherer transmission and send to the access strategy server to verify; The network insertion requestor sends the request of access to accessing control server.
Said accessing control server comprises network insertion strategy execution parts, and network insertion strategy execution parts are handled the network insertion request of portable terminal according to the judged result of access strategy server.
Said access strategy server comprises integrity verification person, credible Connection Service device end and network insertion authorization module; The integrity verification person verifies the integrity value of portable terminal; Credible Connection Service device end is provided with the platform identity and the completeness of platform state of network insertion strategy, checking portable terminal, and provides the network insertion suggestion; The network insertion authorization module receives the suggestion of credible Connection Service device end transmission and is transported to accessing control server.
Compared with prior art, good effect of the present invention is:
The invention has the advantages that, two-way platform authentication is provided, AR and PDP can verify the other side's platform evidence of identity and integrality state each other.Completeness of platform through the checking both sides is set up the trusting relationship between AR and the PDP.PDP is the define grid access strategy independently; PDP can take assessment, isolation and corrective action to AR; When the environment of network access request person's end points machine can not reach trust in the access control safety strategy and requires; The network access authority that will be authorized part go to visit one independently network (both can make be physically independently network also can be network independently in logic), this independently network will allow them through the necessary assembly of access control policy for they provide enough connections to download, install and upgrade.Through above measure, portable terminal trustable network access technology can be good at guaranteeing that Internet resources are protected.
Description of drawings
Fig. 1 is a portable terminal trustable network connecting system structural representation block diagram;
Fig. 2 is the flow chart of portable terminal trustable network cut-in method.
Embodiment
Below in conjunction with the concrete elaboration of accompanying drawing portable terminal trustable network access technology of the present invention.
As shown in Figure 1, portable terminal trustable network connecting system comprises portable terminal, accessing control server and the access strategy server that request inserts.
1. send the portable terminal (AR of the request of access; Access Requestor); Be connected with PEP through wireless, it is equipped with network insertion commonly used usually and brings in the general network access mode of support, like 802.1x; The AR deploy has integrality gatherer (IMC; Integrity Measurement Collector Interface), trustable network connects client (TNCC, Trusted Network Connect Client) and network insertion requestor (NAR, Network Access Requestor).
2. network access equipment (PEP, Policy Enforcement Point), for example AP, vpn gateway etc. need to support 802.1x and VPN access way commonly used.The PEP deploy has network insertion strategy execution parts (NAE, Network Access Enforcer).
3. access strategy server (PDP, Policy Decision Point), PDP be with determining whether allowing AR to insert, and PDP is RADIUS and Diameter server normally.The PDP deploy has integrity verification person (IMV; Integrity Measurement Verifiers), credible Connection Service device end (TNCS; Trusted Network Connect Server) and network insertion authorization server (NAA, Network Access Authority).
Portable terminal trustable network access technology logically is divided into three levels (from top to bottom):
Ground floor: integrality collection/checking layer.IMC and IMV be in the work of this level, operates in the integrity value that modes such as configuration file through reading portable terminal of IMC on the portable terminal, scanning executable file are collected portable terminal, and submit to IMV and verify.Integrity verification person IMV collects the integrity value of access strategy server, and submits to IMC and verify through the configuration file, the scanning executable file mode that read the access strategy server.
The second layer: integrity assessment layer.TNCC and TNCS are in this level work; Whether the numerical value of expecting during TNCC is responsible for initialization and loads IMC, system integrity value and inherently safe strategy through TNCS relatively is identical; Verify the connection between TNCS platform identity and integrality state, management and the TNCS, the portable terminal integrity measurement value that reception IMC sends, and it is transmitted to TNCS.Whether platform identity and completeness of platform state, the integrity measurement value of checking AR, the running status of assessment AR that TNCS comprises network insertion strategy (like " allowing to insert ", " allowing to insert the subnetwork resource ", " refusal inserts, and isolates portable terminal " etc.), checking AR satisfy the network insertion strategy and provide the TNCS suggestion.
The 3rd layer: network access layer.NAR, NAE and NAA are in this layer work, and NAE is responsible for communicating by letter with NAA, and NAE is responsible for transmitting access message to NAA, and NAA receives the TNCS suggestion and sends to NAE and carries out.
As shown in Figure 2, the concrete implementation of portable terminal trustable network cut-in method is following:
1. move and insert the client and server initialization:
TNCC is written into IMC and detects the integrality of IMC and (prevents to be written into the IMC that suffers that Malware is forged, distorted; Guarantee the credibility of IMC); TNCS is written into IMV and detects the integrality of IMV (prevent to be written into the IMV that suffers that Malware is forged, distorted, guarantee the credibility of IMV).IMC and IMV show as a dynamic link libraries (like dll file, so file or jar file).After the completeness check success, system is ready, can initiate to insert request.
2.AR NAR send the network insertion request message to PEP:
The form of network insertion request message is following:
Wherein, Username is a user name, is the character string with 0 ending.The user of expression current request access network.Password refers to user password, is the character string with 0 ending equally.IDNum refers to the Property ID number, and AttID refers to Property ID, and expression current request platform can provide the Property ID of integrity report.
The mode that move to insert the webservice that communicating by letter between client and the server provide with the invoking server end realizes.Webservice defines as follows:
Figure BDA00001821363700061
TNCC calls this web service and TNCS exchanges messages; Connection representes unique indications of current access; Term_address representes to insert the IP of portable terminal; Tnc_message_in representes that trustable network to be transmitted inserts message, and tnc_message_out representes that the trustable network of receiving inserts message.
3.PEP after receiving the network requests message that NAR sends, PEP sends the network insertion decision request to NAA.After NAA received the network insertion decision request that PEP sends, the identity of checking AR was if the authenticated failure then directly requires the network connecting request of PEP refusal AR.
4.TNCC and accomplish platform authentication and completeness of platform state verification between the TNCS, and notify the new network connecting request that is connected of IMC and IMV to begin respectively.
5.TNCS the information of IMC is issued IMV, and IMV verifies the integrality of IMC, and exchanges messages through TNCS and IMC.The message that TNCC sends TNCS is passed to suitable IMC, and IMC verifies the integrality of IMV, and exchanges messages through TNCC and IMV, and the portable terminal AR system integrity information of then AMC being collected sends to IMV.Both sides' interactive messages comprises the concrete request (collecting operating system version and the patch information of portable terminal etc. like request) of the collection mobile terminal system integrality that IMV sends to IMC; A series of integrity value (like operating system version and patch information etc.) of this portable terminal that the request of collecting is collected according to integrality that IMC returns to IMV; The concrete request of the collection access strategy server system integrality that IMC sends to IMV; A series of integrity value of the access strategy server that the request of collecting is collected according to integrality that IMV returns to IMC.When the IMV decision provides IMV action suggestion (like " allowing to insert ", " allowing to insert the subnetwork resource ", " refusal inserts; isolate portable terminal " etc.); IMV passes to TNCS with message; TNCS forms TNCS access suggestion according to IMV action suggestion and the security strategy of self, and carries out TNCS and insert suggestion, the completion access process.
The data structure of mobile terminal system integrity properties ID comprises: integrity properties Id, integrity properties length, integrity properties value, and its form is following:
Figure BDA00001821363700062
Figure BDA00001821363700071
Wherein the value of 32 digital id is used to represent an integrity properties to be collected.The length of the integrity value that length refers to collect, value is the integrity value of collecting.
6.TNCS the TNCS suggestion is made in suggestion according to IMV, and gives NAA with TNCS suggestion notice.NAA allows, refuses according to TNCS suggestion decision or part is authorized AR network access authority, and NAA notifies final decision to PEP.NAA communicates through the WebService that calls PEP and provide, and WebService defines as follows:
Figure BDA00001821363700072
Wherein, the terminal IP that term_address refers to an access, allowed refer to allow the IP and the port list that insert.
Although disclose specific embodiment of the present invention and accompanying drawing for the purpose of illustration; Its purpose is to help to understand content of the present invention and implement according to this; But it will be appreciated by those skilled in the art that: in the spirit and scope that do not break away from the present invention and appended claim, various replacements, variation and modification all are possible.Therefore, the present invention should not be limited to most preferred embodiment and the disclosed content of accompanying drawing, and the scope that the present invention requires to protect is as the criterion with the scope that claims define.

Claims (9)

1. a portable terminal trustable network cut-in method the steps include:
1) portable terminal is written into integrality gatherer IMC and detects its integrality, access strategy server person IMV that is written into the integrity verification and detect its integrality;
2) portable terminal sends the network insertion request to accessing control server;
3) after accessing control server is received the network insertion request, send the network insertion decision request to the access strategy server;
4) after the access strategy server is received decision request, checking mobile terminal user identity;
5) after the mobile terminal user authentication is passed through, begin to carry out the platform authentication between access strategy server and the portable terminal;
6) portable terminal and access strategy server send message each other, verify both sides' system integrity each other, set up portable terminal and access strategy server both sides' platform trusting relationship;
7) the access strategy server sends the suggestion that whether inserts according to said platform trusting relationship to accessing control server, and accessing control server advises that according to this permission, refusal or part are authorized the mobile terminal network access rights.
2. the method for claim 1 is characterized in that the method for said portable terminal and access strategy server authentication both sides' system integrity is:
1) the integrality gatherer IMC of integrity verification person IMV on portable terminal on the access strategy server sends the request message of collecting the mobile terminal system integrality;
2) integrality gatherer IMC returns the integrity value of the portable terminal of collecting to integrity verification person IMV;
3) the integrity verification person IMV of integrality gatherer IMC on the access strategy server sends the request message of collecting access strategy server system integrality;
4) integrity verification person IMV returns the integrity value of the access strategy server of collecting to integrality gatherer IMC;
5) integrity value returned according to integrality gatherer IMC of integrity verification person IMV, the system integrity of checking portable terminal is made suggestion to whether allowing portable terminal to insert; The system integrity that integrality gatherer IMC returns according to integrity verification person IMV confirms whether the access strategy server can trust.
3. method as claimed in claim 2 is characterized in that described request message comprises operating system version, whether Malware and patch information are arranged.
4. method as claimed in claim 2 is characterized in that said integrality gatherer IMC is through the configuration file that reads portable terminal, the integrity value that scanning executable file mode is collected portable terminal; Said integrity verification person IMV is through the configuration file that reads the access strategy server, the integrity value that scanning executable file mode is collected the access strategy server.
5. method as claimed in claim 2 is characterized in that whether the numerical value of expecting in the system integrity value of portable terminal through comparison access strategy server and the portable terminal inherently safe strategy is identical, the identity and the integrality state of checking access strategy server.
6. the method for claim 1 is characterized in that said network insertion request message comprises: user name, user password, Property ID, Property ID number; The data structure of said Property ID comprises: integrity properties Id, integrity properties length, integrity properties value.
7. portable terminal trustable network connecting system is characterized in that comprising portable terminal AR, accessing control server PEP and the access strategy server PDP of the network interconnection;
Said portable terminal comprises that integrality gatherer, trustable network connect client and network insertion requestor; Trustable network connection client is used to receive the integrity value of integrality gatherer transmission and sends to the access strategy server to be verified; The network insertion requestor is used for sending the request of access to accessing control server;
Said accessing control server is used for according to the judged result of access strategy server the network insertion request of portable terminal being handled;
Said access strategy server comprises integrity verification person, credible Connection Service device end and network insertion authorization module; The integrity verification person verifies the integrity value of portable terminal; Credible Connection Service device end is provided with the platform identity and the completeness of platform state of network insertion strategy, checking portable terminal, and provides the network insertion suggestion; The network insertion authorization module receives the suggestion of credible Connection Service device end transmission and is transported to accessing control server.
8. system as claimed in claim 7 is characterized in that said network insertion request message comprises: user name, user password, Property ID, Property ID number.
9. system as claimed in claim 8 is characterized in that the data structure of said Property ID comprises: integrity properties Id, integrity properties length, integrity properties value.
CN201210222083XA 2012-06-28 2012-06-28 Trusted network access method and system for mobile terminal Pending CN102740296A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210222083XA CN102740296A (en) 2012-06-28 2012-06-28 Trusted network access method and system for mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210222083XA CN102740296A (en) 2012-06-28 2012-06-28 Trusted network access method and system for mobile terminal

Publications (1)

Publication Number Publication Date
CN102740296A true CN102740296A (en) 2012-10-17

Family

ID=46994897

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210222083XA Pending CN102740296A (en) 2012-06-28 2012-06-28 Trusted network access method and system for mobile terminal

Country Status (1)

Country Link
CN (1) CN102740296A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103780395A (en) * 2014-01-24 2014-05-07 广东电网公司电力科学研究院 Method and system for proving bidirectional measurement through network access
WO2014176743A1 (en) * 2013-04-28 2014-11-06 华为终端有限公司 Method, device and system for configuring wireless terminal
WO2015106565A1 (en) * 2014-01-17 2015-07-23 中兴通讯股份有限公司 Method and device for controlling congestion when accessing core network via twan
CN106713229A (en) * 2015-11-13 2017-05-24 国网智能电网研究院 Intelligent power grid terminal trusted access system based on user behaviors and intelligent power grid terminal trusted access method thereof
CN106713258A (en) * 2015-11-17 2017-05-24 现代自动车株式会社 Method and apparatus for providing security service for vehicle-dedicated data channel
CN108243631A (en) * 2016-10-27 2018-07-03 华为技术有限公司 A kind of method and apparatus for accessing network
CN109729523A (en) * 2017-10-31 2019-05-07 华为技术有限公司 A kind of method and apparatus of terminal networking certification
CN115150833A (en) * 2022-09-05 2022-10-04 北京珞安科技有限责任公司 Network access control system and method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159640A (en) * 2007-11-16 2008-04-09 西安西电捷通无线网络通信有限公司 Ternary equal identification based reliable network access control system
CN101350721A (en) * 2007-07-20 2009-01-21 华为技术有限公司 Network system, network access method and network appliance
CN102035838A (en) * 2010-12-07 2011-04-27 中国科学院软件研究所 Trust service connecting method and trust service system based on platform identity

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101350721A (en) * 2007-07-20 2009-01-21 华为技术有限公司 Network system, network access method and network appliance
CN101159640A (en) * 2007-11-16 2008-04-09 西安西电捷通无线网络通信有限公司 Ternary equal identification based reliable network access control system
WO2009065350A1 (en) * 2007-11-16 2009-05-28 China Iwncomm Co., Ltd. A trusted network acces control system based ternery equal identification
CN102035838A (en) * 2010-12-07 2011-04-27 中国科学院软件研究所 Trust service connecting method and trust service system based on platform identity

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10091650B2 (en) 2013-04-28 2018-10-02 Huawei Device (Dongguan) Co., Ltd. Wireless terminal configuration method, device, and system
WO2014176743A1 (en) * 2013-04-28 2014-11-06 华为终端有限公司 Method, device and system for configuring wireless terminal
CN105009618A (en) * 2013-04-28 2015-10-28 华为终端有限公司 Method, device and system for configuring wireless terminal
CN105009618B (en) * 2013-04-28 2019-05-10 华为终端(东莞)有限公司 A kind of method of configuration of wireless terminal, equipment and system
WO2015106565A1 (en) * 2014-01-17 2015-07-23 中兴通讯股份有限公司 Method and device for controlling congestion when accessing core network via twan
CN103780395A (en) * 2014-01-24 2014-05-07 广东电网公司电力科学研究院 Method and system for proving bidirectional measurement through network access
CN103780395B (en) * 2014-01-24 2017-11-10 广东电网公司电力科学研究院 Network insertion proves the method and system of two-way measurement
CN106713229A (en) * 2015-11-13 2017-05-24 国网智能电网研究院 Intelligent power grid terminal trusted access system based on user behaviors and intelligent power grid terminal trusted access method thereof
CN106713258A (en) * 2015-11-17 2017-05-24 现代自动车株式会社 Method and apparatus for providing security service for vehicle-dedicated data channel
CN106713258B (en) * 2015-11-17 2020-11-10 现代自动车株式会社 Method and apparatus for providing security service for vehicle-specific data channel
CN108243631A (en) * 2016-10-27 2018-07-03 华为技术有限公司 A kind of method and apparatus for accessing network
CN108243631B (en) * 2016-10-27 2020-11-06 华为技术有限公司 Network access method and equipment
US10904763B2 (en) 2016-10-27 2021-01-26 Huawei Technologies Co., Ltd. Network access method and device
CN109729523A (en) * 2017-10-31 2019-05-07 华为技术有限公司 A kind of method and apparatus of terminal networking certification
WO2019085531A1 (en) * 2017-10-31 2019-05-09 华为技术有限公司 Method and device for network connection authentication
US11432150B2 (en) 2017-10-31 2022-08-30 Huawei Technologies Co., Ltd. Method and apparatus for authenticating network access of terminal
CN115150833A (en) * 2022-09-05 2022-10-04 北京珞安科技有限责任公司 Network access control system and method

Similar Documents

Publication Publication Date Title
CN102740296A (en) Trusted network access method and system for mobile terminal
CN102047262B (en) Authentication for distributed secure content management system
EP2180632B1 (en) A method for trusted network connect based on tri-element peer authentication
EP2574090B1 (en) Managing mobile device applications
EP2574098B1 (en) Managing mobile device applications in a wireless network
EP1782265B1 (en) System and method for secure network connectivity
US8359464B2 (en) Quarantine method and system
CN104202338B (en) A kind of safety access method being applicable to enterprise-level Mobile solution
RU2437228C2 (en) System of trustworthy network connection for safety improvement
CN103079200B (en) The authentication method of a kind of wireless access, system and wireless router
KR100835820B1 (en) Total internet security system and method the same
US7805512B2 (en) Remote configuration, provisioning and/or updating in a layer two authentication network
US20050132229A1 (en) Virtual private network based on root-trust module computing platforms
JP2019526993A (en) Network function virtualization system and verification method
EP2421215B1 (en) Method for establishing trusted network connect framework of tri-element peer authentication
EP3042487B1 (en) Secured mobile communications device
CN114553540B (en) Zero trust-based Internet of things system, data access method, device and medium
CN114143034A (en) Network access security detection method and device
CN106059802B (en) Terminal access authentication method and device
CN105392137A (en) Household WIFI embezzlement preventing method, wireless router and terminal equipment
US20130073844A1 (en) Quarantine method and system
CN115150208A (en) Zero-trust-based Internet of things terminal secure access method and system
CN104104745B (en) A kind of electric network terminal safety permission method
CN112016073A (en) Method for constructing server zero trust connection architecture
CN114915427B (en) Access control method, device, equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20121017