WO2009138026A1 - A safety status estimate method, network apparatus and network system - Google Patents

A safety status estimate method, network apparatus and network system Download PDF

Info

Publication number
WO2009138026A1
WO2009138026A1 PCT/CN2009/071747 CN2009071747W WO2009138026A1 WO 2009138026 A1 WO2009138026 A1 WO 2009138026A1 CN 2009071747 W CN2009071747 W CN 2009071747W WO 2009138026 A1 WO2009138026 A1 WO 2009138026A1
Authority
WO
WIPO (PCT)
Prior art keywords
evaluator
communication entity
evaluation result
information
entity
Prior art date
Application number
PCT/CN2009/071747
Other languages
French (fr)
Chinese (zh)
Inventor
贾科
尹瀚
任兰芳
刘夫萍
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2009138026A1 publication Critical patent/WO2009138026A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Definitions

  • the present invention relates to the field of network technologies, and in particular, to a security state evaluation method, a network device, and a network system.
  • Terminals such as user hosts, workstations, and servers are the starting point and end point of network data flow, and are also the source of network security events.
  • a large number of insecure terminals that are connected to the network will not only be the target of attack, but also may be exploited by attackers to become an intermediate medium for virus propagation and hacker attacks, thereby seriously affecting the normal operation of the entire network. Therefore, the network security problem brought by unsecured terminals must be solved from the source of network security risks.
  • TNC Trusted Network Connect
  • the TNC architecture includes: Access Requestor (AR), Policy Enforcement Point (PEP), Policy Decision Point (PDP), Metadata Access Point (MAP). ), flow controllers and sensors.
  • AR Access Requestor
  • PEP Policy Enforcement Point
  • PDP Policy Decision Point
  • MAP Metadata Access Point
  • flow controllers sensors.
  • the AR requests access to a protected network
  • the PDP performs the evaluation of the AR security status information according to the security policy configuration of the network, and makes a decision based on the result of the evaluation. This decision is then passed to PEP, which responds to the AR's access request #.
  • the inventors have found that the following problems exist in the prior art:
  • the terminal when requesting access to the network, the terminal must advertise its own security status information to the network side, and the network side The security status information is evaluated. Therefore, when the TNC architecture is used to evaluate the security status of the terminal, the privacy of the terminal is not protected, and the security of the terminal is low. Summary of the invention
  • an embodiment of the present invention provides a security state evaluation method, which can fully protect the privacy of a communication entity, enhance the security of the communication entity, and improve the flexibility of the security state assessment.
  • a method for assessing safety status including:
  • the responder receives the communication request from the requesting party and the information of the evaluator trusted by the requesting party;
  • the responder obtains the evaluator's security status assessment result for the requestor, and the security status assessment result is The evaluator obtains based on security status information from the requesting party;
  • the responder responds to the requesting party's communication request according to the evaluation result.
  • the requesting party and the responding party negotiate to determine the evaluator, and the evaluator evaluates the requesting party according to the security status information of the requesting party, and the responding party responds to the requesting party according to the evaluation result.
  • the requesting party does not need to advertise its own security status information to the responding party, thereby avoiding the attack due to the leakage of the security state information, fully protecting the privacy of the communicating entity, and enhancing the security of the communicating entity.
  • Sexuality increases the flexibility of security status assessment.
  • the evaluator is used to obtain the security status information of the requesting party, evaluate the security status of the requesting party, and obtain the evaluation result.
  • the second communication entity acquires an evaluation result of the first communication entity by the first evaluator, and the evaluation result of the first evaluator by the first evaluator is obtained by the first evaluator according to the security status information from the first communication entity;
  • the first communication entity obtains an evaluation result of the second communication entity by the second evaluator, and the evaluation result of the second evaluator by the second evaluator is obtained by the second evaluator according to the security status information from the second communication entity;
  • the first communicating entity responds to the second communicating entity based on the evaluation result.
  • a first communication entity configured to send a communication request to the second communication entity, notify the second communication entity of the information of the evaluator that is trusted by the second communication entity, and obtain an evaluation result of the second communication entity by the second evaluator, Responding to the second communication entity based on the evaluation result;
  • the first communication entity and the second communication entity negotiate to determine respective evaluators, and each evaluator evaluates the communication entity according to the security status information of the communication entity that it evaluates, and the two communication entities are The evaluation results respond to the contralateral communication entity.
  • the two communication entities do not need to advertise their own security status information to the opposite communication entity, thereby avoiding the attack due to the leakage of the security status information, fully protecting the privacy of the communication entity, and enhancing the communication.
  • the security of the entity increases the flexibility of the assessment of the security status.
  • FIG. 8 is a schematic structural diagram of a network system according to an embodiment of the present disclosure.
  • the types of the requesting party, the responding party, and the communicating entity may be a mobile phone, a PDA, a computer, a server, a home appliance, and various network devices (such as a network server or a service provider or an application server, etc.) ), electronic equipment or computer related equipment.
  • Step 1 02 According to the evaluator's information, the responder or the requesting party determines an evaluator that both parties trust;
  • the requester A requests the responder B for the network service. After the two parties negotiate, the B selects the evaluator C that both parties trust, and the evaluator C evaluates the security status information of the requester A.
  • the specific implementation process of this embodiment includes the following steps:

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A safety status estimate method, network apparatus and network system. The safety status estimate method includes: responding side receiving the communication request  and the information of estimators trusted by the request side from the request side; according to the information of estimators, either the responding side or the request side determining the estimator trusted by both; the responding side obtaining the safety status estimating results of the request side by the estimator, which is achieved by the estimator according to the safety status information from the request side; the responding side responding to the communication request from the request side according to the estimating results. It is befitting to safety status estimate for communication entity.

Description

安全状态评估方法、 网络设备和网络系统 技术领域  Safety state assessment method, network device and network system
本发明涉及网络技术领域, 特别涉及一种安全状态评估方法、 网络设备 和网络系统。  The present invention relates to the field of network technologies, and in particular, to a security state evaluation method, a network device, and a network system.
背景技术 Background technique
随着网络技术的不断发展, 网络规模越来越大, 网络的应用也越来越广 泛。 与此同时, 网络中出现的安全问题也越来越频繁, 网络安全形势日趋严 峻。 而用户主机、 工作站、 服务器等终端是网络数据流的起点与终点, 也是 网络安全事件产生的根源。 大量接入到网络中的不安全终端不仅会成为被攻 击的对象, 还可能被攻击者所利用, 成为病毒传播、 黑客攻击的中间媒介, 进而严重影响整个网络的正常运行。 因此, 必须从产生网络安全隐患的源头 上解决不安全终端带来的网络安全问题。  With the continuous development of network technology, the scale of the network is getting larger and larger, and the application of the network is becoming more and more extensive. At the same time, security issues in the network have become more frequent, and the network security situation has become increasingly severe. Terminals such as user hosts, workstations, and servers are the starting point and end point of network data flow, and are also the source of network security events. A large number of insecure terminals that are connected to the network will not only be the target of attack, but also may be exploited by attackers to become an intermediate medium for virus propagation and hacker attacks, thereby seriously affecting the normal operation of the entire network. Therefore, the network security problem brought by unsecured terminals must be solved from the source of network security risks.
可信计算组织 (Trusted Computing Group, TCG ) 于 2005年颁布了针对 企业网的可信网络连接(Trusted Network Connect, TNC)标准。 TNC架构包 括: 接入请求者 ( Access Requestor, AR )、 策略执行点 ( Pol icy Enf or cement Point, PEP)、 策略决策点 ( Policy Decision Point, PDP )、 元数据访问点 (Metadata Access Point, MAP), 流量控制器和传感器。 当 AR请求接入一 个受保护的网络, PDP根据网络的安全策略配置完成对 AR安全状态信息的评 估, 根据评估的结果做出决策。 然后将这一决策传给 PEP, 由 PEP对 AR的接 入请求 #丈出响应。  The Trusted Computing Group (TCG) in 2005 promulgated the Trusted Network Connect (TNC) standard for enterprise networks. The TNC architecture includes: Access Requestor (AR), Policy Enforcement Point (PEP), Policy Decision Point (PDP), Metadata Access Point (MAP). ), flow controllers and sensors. When the AR requests access to a protected network, the PDP performs the evaluation of the AR security status information according to the security policy configuration of the network, and makes a decision based on the result of the evaluation. This decision is then passed to PEP, which responds to the AR's access request #.
在实现本发明的过程中, 发明人发现现有技术中存在如下问题: 在现有的 TNC 架构中, 终端在请求接入网络时, 必须将自己的安全状态 信息公布给网络方, 由网络方对所述安全状态信息进行评估。 因此, 采用 TNC 架构对终端进行安全状态评估时, 终端的隐私得不到保护, 终端的安全性低。 发明内容 In the process of implementing the present invention, the inventors have found that the following problems exist in the prior art: In the existing TNC architecture, when requesting access to the network, the terminal must advertise its own security status information to the network side, and the network side The security status information is evaluated. Therefore, when the TNC architecture is used to evaluate the security status of the terminal, the privacy of the terminal is not protected, and the security of the terminal is low. Summary of the invention
一方面, 本发明的实施例提供一种安全状态评估方法, 该方法能够充分 保护通信实体的隐私, 增强通信实体的安全性, 提高安全状态评估的灵活性。  In one aspect, an embodiment of the present invention provides a security state evaluation method, which can fully protect the privacy of a communication entity, enhance the security of the communication entity, and improve the flexibility of the security state assessment.
本发明实施例的安全状态评估方法采用以下技术方案:  The security state evaluation method of the embodiment of the present invention adopts the following technical solutions:
一种安全状态评估方法, 包括:  A method for assessing safety status, including:
响应方接收来自请求方的通信请求, 以及所述请求方所信任评估者的信 息;  The responder receives the communication request from the requesting party and the information of the evaluator trusted by the requesting party;
根据所述评估者的信息, 所述响应方或请求方确定双方都信任的评估者; 所述响应方获取所述评估者对所述请求方的安全状态评估结果, 所述安 全状态评估结果由所述评估者根据来自请求方的安全状态信息获取;  Determining, according to the evaluator's information, the evaluator that both parties trust; the responder obtains the evaluator's security status assessment result for the requestor, and the security status assessment result is The evaluator obtains based on security status information from the requesting party;
所述响应方根据所述评估结果对所述请求方的通信请求做出响应。  The responder responds to the requesting party's communication request according to the evaluation result.
本发明实施例的安全状态评估方法, 请求方和响应方协商确定评估者, 由评估者根据请求方的安全状态信息, 对请求方进行评估, 响应方根据评估 结果对请求方做出响应。 与现有技术相比, 请求方不需要将自己的安全状态 信息公布给响应方, 避免了由于安全状态信息的泄漏而导致自身受到攻击, 充分保护了通信实体的隐私, 增强了通信实体的安全性, 提高了安全状态评 估的灵活性。  In the security state evaluation method of the embodiment of the present invention, the requesting party and the responding party negotiate to determine the evaluator, and the evaluator evaluates the requesting party according to the security status information of the requesting party, and the responding party responds to the requesting party according to the evaluation result. Compared with the prior art, the requesting party does not need to advertise its own security status information to the responding party, thereby avoiding the attack due to the leakage of the security state information, fully protecting the privacy of the communicating entity, and enhancing the security of the communicating entity. Sexuality increases the flexibility of security status assessment.
另一方面, 本发明的实施例提供一种网络设备, 该网络设备能够充分保 护通信实体的隐私, 增强通信实体的安全性, 提高安全状态评估的灵活性。  In another aspect, embodiments of the present invention provide a network device capable of sufficiently protecting the privacy of a communication entity, enhancing the security of the communication entity, and improving the flexibility of the security state assessment.
本发明实施例的网络设备采用以下技术方案:  The network device in the embodiment of the present invention adopts the following technical solutions:
一种网络设备, 包括:  A network device, including:
安全状态信息获取单元, 用于获取第一通信实体的安全状态信息; 评估单元, 用于根据所述安全状态信息, 对所述第一通信实体进行安全 状态评估, 将评估结果发送给与所述第一通信实体通信的第二通信实体, 由 所述第二通信实体根据所述评估结果对所述被评估的通信实体做出响应。  a security status information obtaining unit, configured to obtain security status information of the first communication entity, and an evaluation unit, configured to perform security status assessment on the first communication entity according to the security status information, and send the evaluation result to the A second communication entity communicating with the first communication entity, the second communication entity responding to the evaluated communication entity based on the evaluation result.
本发明实施例的网络设备, 安全状态信息获取单元获取需要评估的通信 实体的安全状态信息, 评估单元根据所述安全状态信息, 对第一通信实体进 行安全状态评估, 并将评估结果发送给第二通信实体, 由第二通信实体根据 所述结果对所述被评估的通信实体做出响应。 与现有技术相比, 第一通信实 体不需要将自己的安全状态信息公布给第二通信实体, 避免了由于安全状态 信息的泄漏而导致自身受到攻击, 充分保护了通信实体的隐私, 增强了通信 实体的安全性, 提高了安全状态评估的灵活性。 The network device of the embodiment of the present invention, the security state information acquiring unit acquires the communication that needs to be evaluated The security status information of the entity, the evaluation unit performs a security status assessment on the first communication entity according to the security status information, and sends the evaluation result to the second communication entity, where the second communication entity evaluates the result according to the result. The communicating entity responds. Compared with the prior art, the first communication entity does not need to advertise its own security status information to the second communication entity, thereby avoiding the attack due to the leakage of the security state information, fully protecting the privacy of the communication entity, and enhancing the The security of the communication entity increases the flexibility of the security status assessment.
第三方面, 本发明的实施例提供一种网络系统, 该网络系统能够充分保 护通信实体的隐私, 增强通信实体的安全性, 提高安全状态评估的灵活性。  In a third aspect, an embodiment of the present invention provides a network system capable of sufficiently protecting the privacy of a communication entity, enhancing the security of the communication entity, and improving the flexibility of the security state assessment.
本发明实施例的网络系统采用以下技术方案:  The network system of the embodiment of the present invention adopts the following technical solutions:
一种网络系统, 包括:  A network system, including:
请求方, 用于向响应方请求建立通信, 将自己所信任评估者的信息告知 响应方;  The requesting party is configured to request the responding party to establish communication, and inform the responding party of the information of the evaluator that it trusts;
响应方, 用于接收请求方发送来的评估者的信息, 根据所述评估者的信 息, 确定双方都信任的评估者, 获取所述评估者对请求方的评估结果, 根据 所述评估结果对请求方做出响应;  a responding party, configured to receive information of an evaluator sent by the requesting party, determine an evaluator trusted by both parties according to the evaluator's information, and obtain an evaluation result of the evaluator on the requesting party, according to the evaluation result The requesting party responds;
评估者, 用于获取请求方的安全状态信息, 对请求方的安全状态进行评 估, 得到评估结果。  The evaluator is used to obtain the security status information of the requesting party, evaluate the security status of the requesting party, and obtain the evaluation result.
本发明实施例的网络系统, 请求方和响应方协商确定评估者, 由评估者 根据请求方的安全状态信息, 对请求方进行评估, 响应方根据评估结果对请 求方做出响应。 与现有技术相比, 请求方不需要将自己的安全状态信息公布 给响应方, 避免了由于安全状态信息的泄漏而导致自身受到攻击, 充分保护 了通信实体的隐私, 增强了通信实体的安全性, 提高了安全状态评估的灵活 性。  In the network system of the embodiment of the present invention, the requesting party and the responding party determine the evaluator by negotiation, and the evaluator evaluates the requesting party according to the security status information of the requesting party, and the responding party responds to the requesting party according to the evaluation result. Compared with the prior art, the requesting party does not need to advertise its own security status information to the responding party, thereby avoiding the attack due to the leakage of the security state information, fully protecting the privacy of the communicating entity, and enhancing the security of the communicating entity. Sexuality increases the flexibility of security status assessment.
第四方面, 本发明的实施例提供一种安全状态评估方法, 该方法能够充 分保护通信实体的隐私, 增强通信实体的安全性, 提高安全状态评估的灵活 性。 本发明实施例的安全状态评估方法采用以下技术方案: In a fourth aspect, an embodiment of the present invention provides a security state evaluation method, which can fully protect the privacy of a communication entity, enhance the security of the communication entity, and improve the flexibility of the security state assessment. The security state evaluation method of the embodiment of the present invention adopts the following technical solutions:
一种安全状态评估方法, 包括:  A method for assessing safety status, including:
第二通信实体接收来自第一通信实体的通信请求, 以及第一通信实体所 信任评估者的信息;  The second communication entity receives the communication request from the first communication entity and the information of the evaluator trusted by the first communication entity;
根据第一通信实体所信任评估者的信息, 第二通信实体或第一通信实体 确定双方都信任的第一评估者和第二评估者;  The second communicating entity or the first communicating entity determines the first evaluator and the second evaluator that both parties trust according to the information of the evaluator trusted by the first communicating entity;
第二通信实体获取第一评估者对第一通信实体的评估结果, 所述第一评 估者对第一通信实体的评估结果由第一评估者根据来自第一通信实体的安全 状态信息获取;  The second communication entity acquires an evaluation result of the first communication entity by the first evaluator, and the evaluation result of the first evaluator by the first evaluator is obtained by the first evaluator according to the security status information from the first communication entity;
第二通信实体根据所述评估结果对第一通信实体做出响应;  The second communication entity responds to the first communication entity according to the evaluation result;
第一通信实体获取第二评估者对第二通信实体的评估结果, 所述第二评 估者对第二通信实体的评估结果由第二评估者根据来自第二通信实体的安全 状态信息获取;  The first communication entity obtains an evaluation result of the second communication entity by the second evaluator, and the evaluation result of the second evaluator by the second evaluator is obtained by the second evaluator according to the security status information from the second communication entity;
第一通信实体根据所述评估结果对第二通信实体做出响应。  The first communicating entity responds to the second communicating entity based on the evaluation result.
本发明实施例的安全状态评估方法, 第一通信实体和第二通信实体协商 确定各自的评估者, 每个评估者根据自己评估的通信实体的安全状态信息, 对该通信实体进行评估, 两通信实体根据评估结果对对侧通信实体做出响应。 与现有技术相比, 两通信实体不需要将自己的安全状态信息公布给对侧通信 实体, 避免了由于安全状态信息的泄漏而导致自身受到攻击, 充分保护了通 信实体的隐私, 增强了通信实体的安全性, 提高了安全状态评估的灵活性。  In the security state evaluation method of the embodiment of the present invention, the first communication entity and the second communication entity negotiate to determine respective evaluators, and each evaluator evaluates the communication entity according to the security status information of the communication entity that is evaluated by itself, and the two communication The entity responds to the opposite communication entity based on the evaluation results. Compared with the prior art, the two communication entities do not need to advertise their own security status information to the opposite communication entity, thereby avoiding the attack due to the leakage of the security status information, fully protecting the privacy of the communication entity, and enhancing the communication. The security of the entity increases the flexibility of the assessment of the security status.
第五方面, 本发明的实施例提供一种网络系统, 该网络系统能够充分保 护通信实体的隐私, 增强通信实体的安全性, 提高安全状态评估的灵活性。  In a fifth aspect, an embodiment of the present invention provides a network system capable of fully protecting the privacy of a communication entity, enhancing the security of the communication entity, and improving the flexibility of the security state assessment.
本发明实施例的网络系统采用以下技术方案:  The network system of the embodiment of the present invention adopts the following technical solutions:
一种网络系统, 包括:  A network system, including:
第一通信实体, 用于向第二通信实体发送通信请求, 将自身所信任评估 者的信息告知第二通信实体, 获取第二评估者对第二通信实体的评估结果, 根据所述评估结果对第二通信实体做出响应; a first communication entity, configured to send a communication request to the second communication entity, notify the second communication entity of the information of the evaluator that is trusted by the second communication entity, and obtain an evaluation result of the second communication entity by the second evaluator, Responding to the second communication entity based on the evaluation result;
第二通信实体, 用于接收来自第一通信实体的评估者的信息, 根据第一 通信实体所信任评估者的信息, 确定双方都信任的第一评估者和第二评估者, 获取第一评估者对第一通信实体的评估结果, 根据所述评估结果对第一通信 实体 #丈出响应;  a second communication entity, configured to receive information from an evaluator of the first communication entity, determine, according to the information of the evaluator trusted by the first communication entity, the first evaluator and the second evaluator trusted by both parties to obtain the first assessment The result of the evaluation of the first communication entity, and the response to the first communication entity # according to the evaluation result;
第一评估者, 用于获取第一通信实体的安全状态信息, 对第一通信实体 的安全状态进行评估, 得到评估结果;  a first evaluator, configured to obtain security status information of the first communication entity, and evaluate a security status of the first communication entity to obtain an evaluation result;
第二评估者, 用于获取第二通信实体的安全状态信息, 对第二通信实体 的安全状态进行评估, 得到评估结果。  The second evaluator is configured to obtain security status information of the second communication entity, and evaluate the security status of the second communication entity to obtain an evaluation result.
本发明实施例的网络系统, 第一通信实体和第二通信实体协商确定各自 的评估者, 每个评估者根据自己评估的通信实体的安全状态信息, 对该通信 实体进行评估, 两通信实体根据评估结果对对侧通信实体做出响应。 与现有 技术相比, 两通信实体不需要将自己的安全状态信息公布给对侧通信实体, 避免了由于安全状态信息的泄漏而导致自身受到攻击, 充分保护了通信实体 的隐私, 增强了通信实体的安全性, 提高了安全状态评估的灵活性。  In the network system of the embodiment of the present invention, the first communication entity and the second communication entity negotiate to determine respective evaluators, and each evaluator evaluates the communication entity according to the security status information of the communication entity that it evaluates, and the two communication entities are The evaluation results respond to the contralateral communication entity. Compared with the prior art, the two communication entities do not need to advertise their own security status information to the opposite communication entity, thereby avoiding the attack due to the leakage of the security status information, fully protecting the privacy of the communication entity, and enhancing the communication. The security of the entity increases the flexibility of the assessment of the security status.
附图说明 DRAWINGS
为了更清楚地说明本发明实施例的技术方案, 下面将对实施例描述中所 需要使用的附图作简单地介绍, 显而易见地, 下面描述中的附图仅仅是本发 明的一些实施例, 对于本领域普通技术人员来讲, 在不付出创造性劳动性的 前提下, 还可以根据这些附图获得其他的附图。  In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings used in the description of the embodiments will be briefly described below. It is obvious that the drawings in the following description are only some embodiments of the present invention, Those skilled in the art can also obtain other drawings based on these drawings without paying creative labor.
图 1为本发明实施例提供的安全状态评估方法流程图;  1 is a flowchart of a security state evaluation method according to an embodiment of the present invention;
图 2为本发明安全状态评估方法实施例一流程图;  2 is a flowchart of Embodiment 1 of a method for evaluating a security state according to the present invention;
图 3为本发明安全状态评估方法实施例二流程图;  3 is a flowchart of Embodiment 2 of a method for evaluating a security state according to the present invention;
图 4为本发明实施例提供的另一种安全状态评估方法流程图;  4 is a flowchart of another security state evaluation method according to an embodiment of the present invention;
图 5为本发明安全状态评估方法实施例三流程图;  FIG. 5 is a flowchart of Embodiment 3 of a method for evaluating a security state according to the present invention;
图 6为本发明安全状态评估方法实施例四流程图; 图 7为本发明实施例提供的网络设备结构示意图; 6 is a flowchart of Embodiment 4 of a method for evaluating a security state according to the present invention; FIG. 7 is a schematic structural diagram of a network device according to an embodiment of the present disclosure;
图 8为本发明实施例提供的网络系统结构示意图;  FIG. 8 is a schematic structural diagram of a network system according to an embodiment of the present disclosure;
图 9为本发明实施例提供的另一种网络系统结构示意图。  FIG. 9 is a schematic structural diagram of another network system according to an embodiment of the present invention.
具体实施方式 detailed description
下面将结合本发明实施例中的附图, 对本发明实施例中的技术方案进行 清楚、 完整地描述, 显然, 所描述的实施例是本发明一部分实施例, 而不是 全部的实施例。 基于本发明中的实施例, 本领域普通技术人员在没有作出创 造性劳动前提下所获得的所有其他实施例, 都属于本发明保护的范围。  The technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention. It is obvious that the described embodiments are a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present invention without making creative labor are within the scope of the present invention.
为使本发明技术方案的优点更加清楚, 下面结合附图和实施例对本发明 作详细说明。  In order to make the advantages of the technical solutions of the present invention clearer, the present invention will be described in detail below with reference to the accompanying drawings and embodiments.
在以下本发明的所有实施例中, 安全状态信息包括通信实体所安装操作 系统的版本信息、 补丁信息、 防火墙版本信息、 杀毒软件版本信息或浏览器 版本信息等。  In all of the following embodiments of the present invention, the security status information includes version information of the operating system installed by the communication entity, patch information, firewall version information, antivirus software version information, or browser version information.
在以下本发明的所有实施例中, 请求方、 响应方、 通信实体的类型可以 是手机、 PDA、 计算机、 服务器、 家用电器, 以及各种网络设备(如网络服务 器或者业务提供者或者应用服务器等)、 电子设备或计算机相关设备等。  In all of the following embodiments of the present invention, the types of the requesting party, the responding party, and the communicating entity may be a mobile phone, a PDA, a computer, a server, a home appliance, and various network devices (such as a network server or a service provider or an application server, etc.) ), electronic equipment or computer related equipment.
在以下本发明的所有实施例中, 网络的类型可以是移动网络、 固定网络、 移动固定融合网络, 也可以是局域网、 城域网、 广域网, 还可以是点对点网 络(P2P )、 客户机 /服务器架构的网络(C/ S )等。  In all of the following embodiments of the present invention, the type of the network may be a mobile network, a fixed network, a mobile fixed convergence network, a local area network, a metropolitan area network, a wide area network, or a peer-to-peer network (P2P), a client/server. Architecture of the network (C / S) and so on.
在以下本发明的所有实施例中, 通信请求可以是网络各个层的通信请求, 包括物理层、 链路层的接入请求, 以及应用层的业务或服务请求等。  In all of the following embodiments of the present invention, the communication request may be a communication request of each layer of the network, including a physical layer, an access request of the link layer, and a service or service request of the application layer.
本发明的实施例提供一种安全状态评估方法, 该方法能够充分保护通信 实体的隐私, 增强通信实体的安全性, 提高安全状态评估的灵活性。  Embodiments of the present invention provide a security state evaluation method, which can fully protect the privacy of a communication entity, enhance the security of the communication entity, and improve the flexibility of the security state assessment.
如图 1所示, 安全状态评估方法包括:  As shown in Figure 1, the security status assessment methods include:
步骤 1 01 : 响应方接收来自请求方的通信请求, 以及所述请求方所信任评 估者的信息; 所述通信请求和评估者的信息可以是封装在同一消息中, 也可 以是分别封装发送; Step 101: The responder receives the communication request from the requesting party and the information of the evaluator trusted by the requesting party; the communication request and the evaluator's information may be encapsulated in the same message, or So that the package is sent separately;
步骤 1 02 : 根据所述评估者的信息, 所述响应方或请求方确定双方都信任 的评估者;  Step 1 02: According to the evaluator's information, the responder or the requesting party determines an evaluator that both parties trust;
响应方或请求方确定双方都信任的评估者的过程可以是: 所述评估者的 信息包括多个可选的评估者, 响应方从中选择确定双方都信任的评估者; 或 者是, 响应方将自身所信任的评估者告知请求方, 请求方选择双方都信任的 评估者;  The process of the responder or the requesting party determining the evaluator that both parties trust may be: the evaluator's information includes a plurality of optional evaluators from which the responder selects an evaluator that both parties trust; or, the responder will The evaluator trusted by itself informs the requesting party that the requesting party selects the evaluator that both parties trust;
步骤 1 03 : 所述响应方获取所述评估者对所述请求方的安全状态评估结 果, 所述安全状态评估结果由所述评估者根据来自请求方的安全状态信息获 取;  Step 1 03: The responder obtains the evaluation result of the security status of the evaluator by the evaluator, and the security status evaluation result is obtained by the evaluator according to the security status information from the requesting party;
步骤 1 04 : 所述响应方根据所述评估结果对所述请求方的通信请求做出响 应。  Step 1 04: The responder responds to the requesting party's communication request according to the evaluation result.
本发明实施例的安全状态评估方法, 请求方和响应方协商确定评估者, 由评估者根据请求方的安全状态信息, 对请求方进行评估, 响应方根据评估 结果对请求方做出响应。 与现有技术相比, 请求方不需要将自己的安全状态 信息公布给响应方, 避免了由于安全状态信息的泄漏而导致自身受到攻击, 充分保护了通信实体的隐私, 增强了通信实体的安全性, 提高安全状态评估 的灵活性。 实施例一:  In the security state evaluation method of the embodiment of the present invention, the requesting party and the responding party negotiate to determine the evaluator, and the evaluator evaluates the requesting party according to the security status information of the requesting party, and the responding party responds to the requesting party according to the evaluation result. Compared with the prior art, the requesting party does not need to advertise its own security status information to the responding party, thereby avoiding the attack due to the leakage of the security state information, fully protecting the privacy of the communicating entity, and enhancing the security of the communicating entity. Sex, improve the flexibility of security status assessment. Embodiment 1:
在该实施例中, 请求方 A向响应方 B请求网络服务, 双方协商之后, 由 B选 择双方都信任的评估者 C , 评估者 C对请求方 A的安全状态信息进行评估。 如图 2所示, 该实施例的具体实现过程包括以下步骤:  In this embodiment, the requester A requests the responder B for the network service. After the two parties negotiate, the B selects the evaluator C that both parties trust, and the evaluator C evaluates the security status information of the requester A. As shown in FIG. 2, the specific implementation process of this embodiment includes the following steps:
步骤 201 : 请求方 A向响应方 B请求网络服务, 同时请求方 A将自己所信任 的评估者(、 D、 E的信息告知响应方 B;  Step 201: The requesting party A requests the responding party B for the network service, and the requesting party A informs the responding party B of the information of the evaluator (D, E) that it trusts;
其中,所述网络服务为网页浏览,或者接入由响应方 B管理的一个网络域。 将评估者的 IP地址、 MAC地址、 设备标识符等标识发给响应方8。 The network service is web browsing or accesses a network domain managed by the responder B. The identifier of the evaluator's IP address, MAC address, device identifier, etc. is sent to the responder 8.
步骤 202 : 响应方 B根据请求方 A所信任的评估者(、 D、 E的信息, 直接选 择双方都信任的评估者 C;  Step 202: The responder B directly selects the evaluator C that both parties trust according to the information of the evaluator (D, E) trusted by the requester A;
步骤 203: 评估者 C获取请求方 A的安全状态信息, 并完成对请求方 A的评 估;  Step 203: The evaluator C obtains the security status information of the requester A, and completes the evaluation of the requester A;
其中, 评估者 C可以根据所述安全状态信息, 按照自己的安全策略或者响 应方 B的安全策略, 对所述请求方 A进行实时评估;  The evaluator C may perform real-time evaluation on the requester A according to the security status information according to the security policy or the security policy of the responder B;
或者, 评估者 C直接调用自己所存储的对所述请求方 A的评估结果。  Alternatively, the evaluator C directly calls his own stored evaluation of the requester A.
步骤 204 : 响应方 B获取评估者 C对请求方 A的评估结果;  Step 204: Responder B obtains the evaluation result of the evaluator C on the requester A;
其中, 响应方 B可以直接向评估者 C请求对请求方 A的评估结果; 或者, 评估者 C将评估结果发送给请求方 A, 请求方 A将带有评估者 C标识 的评估结果发给响应方8。  Wherein, the responder B can directly request the evaluator C to evaluate the result of the requester A; or, the evaluator C sends the evaluation result to the requester A, and the requester A sends the evaluation result with the evaluator C identification to the response. Party 8.
步骤 205 : 响应方 B根据所述评估结果对请求方 A做出响应;  Step 205: The responder B responds to the requester A according to the evaluation result;
其中, 所述响应方 B对请求方 A做出的响应为: 响应方 B允许请求方 A完全 接入网络, 或者响应方 B允许请求方 A部分接入网络, 或者响应方 B拒绝请求方 The response of the responder B to the requester A is: the responder B allows the requester A to fully access the network, or the responder B allows the requester A to access the network, or the responder B rejects the requester.
A接入网络。 A access to the network.
实施例二:  Embodiment 2:
在该实施例中, 请求方 A向响应方 B请求建立通信, 双方协商之后, 由 A选 择双方都信任的评估者 C, 评估者 C对请求方 A的安全状态信息进行评估。 如图 3所示, 该实施例的具体实现过程包括以下步骤:  In this embodiment, the requester A requests the responder B to establish communication. After the two parties negotiate, A selects the evaluator C that both parties trust, and the evaluator C evaluates the security status information of the requester A. As shown in FIG. 3, the specific implementation process of this embodiment includes the following steps:
步骤 301 : 与步骤 201相同;  Step 301: The same as step 201;
步骤 302 : 响应方 B将自身所信任的评估者(、 D告知请求方 A;  Step 302: Responder B informs the evaluator (D) that it trusts the requester A;
步骤 303: 请求方 A选择双方都信任的评估者 C;  Step 303: The requester A selects the evaluator C that both parties trust;
步骤 304 : 与步骤 203相同;  Step 304: The same as step 203;
步骤 305 : 与步骤 204相同; 步骤 306 : 与步骤 205相同。 Step 305: The same as step 204; Step 306: Same as step 205.
因而, 利用本发明的实施例安全状态评估方法, 能够充分保护通信实体 的隐私, 增强了通信实体的安全性, 提高了安全状态评估的灵活性。  Therefore, with the security state evaluation method of the embodiment of the present invention, the privacy of the communication entity can be fully protected, the security of the communication entity is enhanced, and the flexibility of the security state evaluation is improved.
本发明的实施例提供另外一种安全状态评估方法, 该方法能够充分保护 通信实体的隐私, 增强通信实体的安全性, 提高安全状态评估的灵活性。  Embodiments of the present invention provide another security state evaluation method, which can fully protect the privacy of a communication entity, enhance the security of the communication entity, and improve the flexibility of the security state assessment.
如图 4所示, 安全状态评估方法包括:  As shown in Figure 4, the security status assessment methods include:
步骤 401 : 第二通信实体接收来自第一通信实体的通信请求, 以及第一通 信实体所信任评估者的信息;  Step 401: The second communication entity receives the communication request from the first communication entity, and the information of the evaluator trusted by the first communication entity;
步骤 402: 根据第一通信实体所信任评估者的信息, 第二通信实体或第一 通信实体确定双方都信任的第一评估者和第二评估者; 其中, 第一评估者负 责对第一通信实体作安全状态评估, 第二评估者负责对第二通信实体作安全 状态评估。  Step 402: The second communication entity or the first communication entity determines a first evaluator and a second evaluator that both parties trust according to the information of the evaluator trusted by the first communication entity; wherein the first evaluator is responsible for the first communication The entity is assessed for security status and the second evaluator is responsible for assessing the security status of the second communicating entity.
步骤 403: 第二通信实体获取第一评估者对第一通信实体的评估结果, 所 述第一评估者对第一通信实体的评估结果由第一评估者根据来自第一通信实 体的安全状态信息获取;  Step 403: The second communication entity acquires an evaluation result of the first communication entity by the first evaluator, and the first evaluator evaluates the first communication entity by the first evaluator according to the security status information from the first communication entity. Obtain;
步骤 404: 第二通信实体根据所述评估结果对第一通信实体做出响应; 步骤 405: 第一通信实体获取第二评估者对第二通信实体的评估结果, 所 述第二评估者对第二通信实体的评估结果由第二评估者根据来自第二通信实 体的安全状态信息获取;  Step 404: The second communication entity responds to the first communication entity according to the evaluation result. Step 405: The first communication entity acquires an evaluation result of the second communication entity by the second evaluator, where the second evaluator The evaluation result of the two communication entities is obtained by the second evaluator according to the security status information from the second communication entity;
步骤 406: 第一通信实体根据所述评估结果对第二通信实体做出响应。 本发明实施例的安全状态评估方法, 第一通信实体和第二通信实体协商 确定各自的评估者, 每个评估者根据自己评估的通信实体的安全状态信息, 对该通信实体进行评估, 两通信实体根据评估结果对对侧通信实体做出响应。 与现有技术相比, 两通信实体不需要将自己的安全状态信息公布给对侧通信 实体, 避免了由于安全状态信息的泄漏而导致自身受到攻击, 充分保护了通 信实体的隐私, 增强了通信实体的安全性, 提高了安全状态评估的灵活性。 实施例三: Step 406: The first communication entity responds to the second communication entity according to the evaluation result. In the security state evaluation method of the embodiment of the present invention, the first communication entity and the second communication entity negotiate to determine respective evaluators, and each evaluator evaluates the communication entity according to the security status information of the communication entity that is evaluated by itself, and the two communication The entity responds to the opposite communication entity based on the evaluation results. Compared with the prior art, the two communication entities do not need to advertise their own security status information to the opposite communication entity, thereby avoiding the attack due to the leakage of the security status information, fully protecting the privacy of the communication entity, and enhancing the communication. The security of the entity increases the flexibility of the assessment of the security status. Embodiment 3:
在该实施例中, 需要通信的通信实体 A和通信实体 B都需要知道对方的评 估结果, 双方协商确定通信实体 A的评估者为评估者 C, 通信实体 B的评估者为 评估者 D, 由评估者 C和评估者 D分别完成对通信实体 A和通信实体 B的评估, 通 信双方根据评估者给出的评估结果, 对对方的请求做出响应。 如图 5所示, 该 实施例的具体实现过程包括以下步骤:  In this embodiment, both the communication entity A and the communication entity B that need to communicate need to know the evaluation result of the other party, and the two parties negotiate to determine that the evaluator of the communication entity A is the evaluator C, and the evaluator of the communication entity B is the evaluator D. The evaluator C and the evaluator D complete the evaluation of the communication entity A and the communication entity B, respectively, and the communication parties respond to the request of the other party according to the evaluation result given by the evaluator. As shown in FIG. 5, the specific implementation process of the embodiment includes the following steps:
步骤 501 : 通信实体 A向通信实体 B请求建立通信, 同时将通信实体 A所信 任的评估者 C、 D、 E的信息告知通信实体 B; 可以将评估者的 IP地址、 MAC地址、 设备标识符等标识发给通信实体 B。  Step 501: The communication entity A requests the communication entity B to establish communication, and simultaneously informs the communication entity B of the information of the evaluators C, D, E trusted by the communication entity A; the evaluator's IP address, MAC address, device identifier can be The identification is sent to the communicating entity B.
步骤 502: 通信实体 B将自己所信任的评估者(、 D告知通信实体 A;  Step 502: The communication entity B informs the evaluator (D) that it trusts the communication entity A;
步骤 503: 通信实体 B选择评估者 D作为自己的评估者;  Step 503: The communication entity B selects the evaluator D as its own evaluator;
步骤 504: 通信实体 A选择评估者 C作为自己的评估者;  Step 504: The communication entity A selects the evaluator C as its own evaluator;
步骤 505 : 评估者 C完成对通信实体 A的评估;  Step 505: The evaluator C completes the evaluation of the communicating entity A;
步骤 506 : 评估者 D完成对通信实体 B的评估;  Step 506: The evaluator D completes the evaluation of the communication entity B;
步骤 507: 通信实体 B获取评估者 C对通信实体 A的评估结果;  Step 507: The communication entity B obtains the evaluation result of the evaluator C on the communication entity A;
其中, 所述评估结果为评估者 C根据通信实体 A的安全状态信息, 对通信 实体 A进行评估获取的结果;  The evaluation result is a result obtained by the evaluator C evaluating the communication entity A according to the security status information of the communication entity A;
或者, 所述评估结果为评估者 C存储的对所述通信实体 A的评估结果。 步骤 508: 通信实体 A获取评估者 D对通信实体 B的评估结果;  Alternatively, the evaluation result is an evaluation result of the communication entity A stored by the evaluator C. Step 508: The communication entity A obtains the evaluation result of the evaluator D on the communication entity B;
其中, 所述评估结果为评估者 D根据通信实体 B的安全状态信息, 对通信 实体 B进行评估获取的结果;  The evaluation result is a result obtained by the evaluator D evaluating the communication entity B according to the security state information of the communication entity B;
或者, 所述评估结果为评估者 D存储的对所述通信实体 B的评估结果。 步骤 509: 通信实体 B根据评估者 C对通信实体 A的评估结果, 对通信实体 A Alternatively, the evaluation result is an evaluation result of the communication entity B stored by the evaluator D. Step 509: The communication entity B according to the evaluation result of the evaluator C to the communication entity A, to the communication entity A
#丈出响应; 步骤 510: 通信实体 A根据评估者 D对通信实体 B的评估结果, 对通信实体 B #丈出响应; #出出响应; Step 510: The communication entity A responds to the communication entity B# according to the evaluation result of the evaluator D to the communication entity B.
步骤 511 : A、 B间完成双向评估, 双方建立通信。  Step 511: A and B complete the two-way evaluation, and the two parties establish communication.
其中,所述步骤 503可以在步骤 504之后执行;所述步骤 505可以在步骤 506 之后执行, 或者步骤 505和步骤 506同时执行; 所述步骤 507可以在步骤 508之 后执行, 或者步骤 507和步骤 508同时执行; 所述步骤 509可以在步骤 510之后 执行。  The step 503 may be performed after the step 504; the step 505 may be performed after the step 506, or the step 505 and the step 506 may be performed simultaneously; the step 507 may be performed after the step 508, or the step 507 and the step 508 Simultaneous execution; the step 509 can be performed after step 510.
实施例四  Embodiment 4
在本实施例中, 应用场景为虚拟可信平台中虚拟机的迁移决策, 由虚拟 移授权方 ( MA, Mi gra t i on Author i ty )。  In this embodiment, the application scenario is a migration decision of the virtual machine in the virtual trusted platform, and the virtual migration authority (MA, Mi gra t i on Author ty ).
MA有两种形式: 一种为数据中心 MA , 所述数据中心 MA统一管理所负责范 围内的所有虚拟机和虚拟平台, 在虚拟机创建 ( crea te )和销毁( des t roy ) 时, 虚拟平台都需要通知该数据中心 MA; 另一种为本地 MA , 所述本地 MA可以 是虚拟机所在的虚拟机监控器层中的功能组件, 也可以是和该虚拟机同样位 于虚拟机监控器层之上的特定虚拟机。 源平台和目标平台上都可以有本地 MA , 通信的时候可以使用其中一个, 也可以两个同时使用。  There are two forms of MA: One is the data center MA, and all the virtual machines and virtual platforms in the scope of the data center MA are managed. In the virtual machine creation (crea te) and destruction (des t roy), the virtual The platform needs to notify the data center MA; the other is the local MA, and the local MA may be a functional component in the virtual machine monitor layer where the virtual machine is located, or may be located at the virtual machine monitor layer as the virtual machine. A specific virtual machine above. There can be a local MA on both the source platform and the target platform. You can use one of them when communicating, or you can use both at the same time.
源平台由于虚拟机监控器层的下层资源负载均衡或者故障修复等原因, 需要把本地虚拟机迁移到目标平台之上的时候, 基于对目标平台的各种安全 属性要求, 就需要一个第三方 (MA ) 来做这些安全属性检查。 由于 MA存在形 式的多样, 所以双方可以通过协商来完成。  When the source platform needs to migrate the local virtual machine to the target platform due to load balancing or fault repair of the lower layer of the virtual machine monitor layer, a third party is required based on various security attribute requirements of the target platform. MA) to do these security attribute checks. Since the MA exists in various forms, both parties can complete the negotiation.
如图 6所示, 该实施例的具体实现过程包括以下步骤:  As shown in FIG. 6, the specific implementation process of this embodiment includes the following steps:
步骤 601 : 源平台向目标平台发送迁移请求, 携带源平台所信任的 MA。 所 ϋΜΑ可以是数据中心 ΜΑ、 源平台的本地 ΜΑ或者目标平台的本地 ΜΑ。  Step 601: The source platform sends a migration request to the target platform, and carries the MA trusted by the source platform. The data can be the data center, the local port of the source platform, or the local port of the target platform.
步骤 602 : 目标平台接收到源平台的迁移请求组件发送的迁移请求后, 从 中选取自身所信任的一个 ΜΑ , 作为源平台和目标平台双方都信任的 ΜΑ , 由源 平台和目标平台共同使用。 这里, 所选取的 MA为数据中心 MA、 源平台的本地 MA或目标平台的本地 MA中的一个。 Step 602: After receiving the migration request sent by the migration request component of the source platform, the target platform selects a defect that is trusted by the target platform, and the source platform trusts both the source platform and the target platform. The platform is used in conjunction with the target platform. Here, the selected MA is one of the data center MA, the local MA of the source platform, or the local MA of the target platform.
步骤 603: 目标平台将选取结果告知源平台, 至此, 源平台和目标平台协 商确定双方共同信任的一个 MA。  Step 603: The target platform informs the source platform of the result of the selection. At this point, the source platform and the target platform negotiate to determine an MA that both parties trust.
上述步骤 602-603为由目标平台(响应方)选取确定双方都信任的一个 MA, 并将选取结果告知源平台 (请求方), 与实施例一所披露的方法类似。  The above steps 602-603 are performed by the target platform (responder) to determine an MA that both parties trust, and inform the source platform (requesting party) of the selection result, which is similar to the method disclosed in Embodiment 1.
与实施例二所披露的方法类似, 当由源平台 (请求方)选取确定双方都 信任的一个 MA 时, 所述步骤 602和步骤 603可以由如下步骤 602a和 603a替换: 步骤 602a: 目标平台接收到源平台的迁移请求组件发送的迁移请求后, 从中选取自身所信任的多个 MA , 并告知源平台, 所述多个 MA包括数据中心 MA、 源平台的本地 MA和目标平台的本地 MA中的至少两个。  Similar to the method disclosed in the second embodiment, when the source platform (requesting party) selects an MA that is trusted by both parties, the step 602 and the step 603 may be replaced by the following steps 602a and 603a: Step 602a: Target platform receiving After the migration request sent by the migration request component of the source platform, select a plurality of MAs that are trusted by the source platform, and notify the source platform, where the multiple MAs include the data center MA, the local MA of the source platform, and the local MA of the target platform. At least two of them.
步骤 603a: 源平台从所述多个 MA中选取确定一个双方都信任的 MA, 由源 平台和目标平台共同使用, 并将选取结果告知目标平台。  Step 603a: The source platform selects, from the plurality of MAs, an MA that is trusted by both parties, and is used by the source platform and the target platform, and notifies the target platform of the selection result.
与实施例三所披露的方法类似, 当由源平台(通信实体 A )和目标平台(通 信实体 B )协商确定双方各自信任的一个 MA时, 所述步骤 602和步骤 603可以由 如下步骤 602b和 603b替换:  Similar to the method disclosed in the third embodiment, when the source platform (communication entity A) and the target platform (communication entity B) negotiate to determine an MA that each party trusts, the step 602 and the step 603 may be performed by the following step 602b and 603b replacement:
步骤 602b: 目标平台接收到源平台的迁移请求组件发送的迁移请求后, 从中选取目标平台的本地 MA, 供目标平台使用; 同时, 从中选取自身所信任 的多个 MA告知源平台。  Step 602b: After receiving the migration request sent by the migration request component of the source platform, the target platform selects the local MA of the target platform for use by the target platform, and selects multiple MAs trusted by the source platform to inform the source platform.
步骤 603b: 源平台从所述多个 MA中选取源平台的本地 MA , 供源平台使用, 并将选取结果告知目标平台。  Step 603b: The source platform selects a local MA of the source platform from the plurality of MAs, and uses the source MA for the source platform, and notifies the target platform of the selection result.
步骤 604: 源平台向所选定的 MA发送对目标平台的属性要求和其它相关迁 移决策所需要的信息;  Step 604: The source platform sends, to the selected MA, information required for the attribute requirements of the target platform and other related migration decisions;
步骤 605: 所选定的 MA对源平台做必要的评估;  Step 605: The selected MA performs necessary evaluation on the source platform;
步骤 606: 所选定的 MA对目标平台做必要的属性要求检查;  Step 606: The selected MA performs necessary attribute check on the target platform;
步骤 607: 源平台获取 MA对目标平台的属性要求检查结果; 步骤 608: 目标平台获取 MA对源平台的属性要求检查结果; Step 607: The source platform acquires an attribute request check result of the MA on the target platform. Step 608: The target platform acquires an attribute request check result of the MA to the source platform.
步骤 609: 源平台和目标平台双方根据所获取的 MA对彼此的属性要求检查 结果, 向对方做出响应, 进行虚拟机的迁移。  Step 609: The source platform and the target platform perform a check result according to the obtained MA to each other, and respond to the other party to perform virtual machine migration.
其中, 所述步骤 605可以在步骤 606之后执行, 或者步骤 605和步骤 606同 时执行; 所述步骤 607可以在步骤 608之后执行, 或者步骤 607和步骤 608同时 执行。  The step 605 may be performed after the step 606, or the step 605 and the step 606 may be performed simultaneously; the step 607 may be performed after the step 608, or the step 607 and the step 608 are performed simultaneously.
实施例五:  Embodiment 5:
在该实施例中, 需要通信的通信实体 A和通信实体 B都需要知道对方的评 估结果, 双方协商之后, 确定通信实体 A和通信实体 B的评估者为同一个评估 者 C, 由评估者 C完成对通信实体 A和通信实体 B的评估, 通信双方根据评估者 C 给出的评估结果, 对对方的请求做出响应。 该实施例的具体实现过程与实施 例三类似, 在此不再贅述。  In this embodiment, both the communication entity A and the communication entity B that need to communicate need to know the evaluation result of the other party. After the two parties negotiate, it is determined that the evaluator of the communication entity A and the communication entity B are the same evaluator C, and the evaluator C The evaluation of the communication entity A and the communication entity B is completed, and the communication parties respond to the request of the other party according to the evaluation result given by the evaluator C. The specific implementation process of this embodiment is similar to that of the third embodiment, and details are not described herein again.
因而, 利用本发明的实施例安全状态评估方法, 能够充分保护通信实体 的隐私, 增强了通信实体的安全性, 提高了通信实体安全状态评估的灵活性。  Therefore, with the security state evaluation method of the embodiment of the present invention, the privacy of the communication entity can be fully protected, the security of the communication entity is enhanced, and the flexibility of the security state assessment of the communication entity is improved.
本发明的实施例还提供一种网络设备, 该网络设备能够充分保护通信实 体的隐私, 增强通信实体的安全性, 提高安全状态评估的灵活性。  Embodiments of the present invention also provide a network device capable of sufficiently protecting the privacy of a communication entity, enhancing the security of the communication entity, and improving the flexibility of the security state assessment.
其中, 所述网络设备可以是计算机、 服务器, 或者通过软件实现, 网络 设备可以部署在网络层或应用层。  The network device may be a computer, a server, or implemented by software, and the network device may be deployed at a network layer or an application layer.
如图 7所示, 所述网络设备包括:  As shown in FIG. 7, the network device includes:
安全状态信息获取单元 701 , 用于获取第一通信实体的安全状态信息; 评估单元 702 , 用于根据所述安全状态信息, 对所述第一通信实体进行安 全状态评估, 将评估结果发送给与所述第一通信实体通信的第二通信实体, 由所述第二通信实体根据所述评估结果对所述被评估的通信实体做出响应。  The security status information obtaining unit 701 is configured to obtain security status information of the first communication entity, and the evaluation unit 702 is configured to perform security status assessment on the first communication entity according to the security status information, and send the evaluation result to the The second communication entity communicated by the first communication entity is responsive to the evaluated communication entity by the second communication entity according to the evaluation result.
本发明实施例的网络设备, 安全状态信息获取单元 701获取需要评估的通 信实体的安全状态信息, 评估单元 702根据所述安全状态信息, 对第一通信实 体进行评估, 并将评估结果发送给第二通信实体, 由第二通信实体根据所述 结果对所述被评估的通信实体做出响应。 与现有技术相比, 第一通信实体不 需要将自己的安全状态信息公布给第二通信实体, 避免了由于安全状态信息 的泄漏而导致自身受到攻击, 充分保护了通信实体的隐私, 增强了通信实体 的安全性, 提高了安全状态评估的灵活性。 In the network device of the embodiment of the present invention, the security status information acquiring unit 701 acquires the security status information of the communication entity that needs to be evaluated, and the evaluation unit 702 evaluates the first communication entity according to the security status information, and sends the evaluation result to the first a second communication entity, according to the second communication entity The result is responsive to the evaluated communication entity. Compared with the prior art, the first communication entity does not need to advertise its own security status information to the second communication entity, thereby avoiding the attack due to the leakage of the security state information, fully protecting the privacy of the communication entity, and enhancing the The security of the communication entity increases the flexibility of the security status assessment.
如图 7所示, 所述网络设备还包括:  As shown in FIG. 7, the network device further includes:
存储单元 703 , 用于存储已评估过的通信实体的评估结果。  The storage unit 703 is configured to store an evaluation result of the evaluated communication entity.
因而, 利用本发明的实施例网络设备, 能够充分保通信实体的隐私, 增 强了通信实体的安全性, 提高了安全状态评估的灵活性。  Therefore, with the network device of the embodiment of the present invention, the privacy of the communication entity can be fully ensured, the security of the communication entity is enhanced, and the flexibility of the security state evaluation is improved.
本发明的实施例还提供一种网络系统, 该网络系统能够充分保护通信实 体的隐私, 增强通信实体的安全性, 提高安全状态评估的灵活性。  Embodiments of the present invention also provide a network system capable of sufficiently protecting the privacy of a communication entity, enhancing the security of the communication entity, and improving the flexibility of the security state assessment.
如图 8所示, 所述网络系统包括:  As shown in FIG. 8, the network system includes:
请求方 801 , 用于向响应方 802请求建立通信, 将自己所信任评估者的信 息告知响应方 802;  The requesting party 801 is configured to request the responding party 802 to establish a communication, and inform the responding party 802 of the information of the evaluator that it trusts;
响应方 802 , 用于接收请求方 801发送来的评估者的信息, 根据所述评估 者的信息, 确定双方都信任的评估者 803 , 获取所述评估者 803对请求方 801的 评估结果, 根据所述评估结果对请求方 801做出响应;  The responder 802 is configured to receive the information of the evaluator sent by the requesting party 801, determine, according to the evaluator's information, an evaluator 803 that both parties trust, and obtain an evaluation result of the evaluator 803 on the requesting party 801, according to The evaluation result responds to the requesting party 801;
评估者 803 , 用于获取请求方 801的安全状态信息, 对请求方 801的安全状 态进行评估, 得到评估结果。  The evaluator 803 is configured to obtain the security status information of the requesting party 801, and evaluate the security status of the requesting party 801 to obtain an evaluation result.
本发明实施例的网络系统, 请求方和响应方协商确定评估者, 由所述评 估者根据请求方的安全状态信息, 对请求方进行评估, 响应方根据评估结果 对请求方做出响应。 与现有技术相比, 请求方不需要将自己的安全状态信息 公布给响应方, 避免了由于安全状态信息的泄漏而导致自身受到攻击, 充分 保护了通信实体的隐私, 增强了通信实体的安全性, 提高了安全状态评估的 灵活性。  In the network system of the embodiment of the present invention, the requesting party and the responding party negotiate to determine an evaluator, and the evaluator evaluates the requesting party according to the security status information of the requesting party, and the responding party responds to the requesting party according to the evaluation result. Compared with the prior art, the requesting party does not need to advertise its own security status information to the responding party, thereby avoiding the attack due to the leakage of the security state information, fully protecting the privacy of the communicating entity, and enhancing the security of the communicating entity. Sexuality increases the flexibility of security status assessment.
其中, 所述评估者 803包括:  The evaluator 803 includes:
存储模块 804 , 用于存储已评估过的请求方 801的评估结果。 所述存储模块 804中存储有已评估过的请求方的评估结果, 请求方可以直 接从所述存储模块中获取评估者对请求方的评估结果。 The storage module 804 is configured to store the evaluation result of the evaluated requester 801. The storage module 804 stores the evaluation result of the evaluated requester, and the requesting party can directly obtain the evaluation result of the evaluator from the requesting party.
因而, 利用本发明的实施例网络系统, 能够充分保护通信实体的隐私, 增强了通信实体的安全性, 提高了安全状态评估的灵活性。  Therefore, with the network system of the embodiment of the present invention, the privacy of the communication entity can be fully protected, the security of the communication entity is enhanced, and the flexibility of the security state evaluation is improved.
本发明的实施例还提供另外一种网络系统, 该网络系统能够充分保护通 信实体的隐私, 增强通信实体的安全性, 提高安全状态评估的灵活性。  Embodiments of the present invention also provide another network system capable of fully protecting the privacy of a communication entity, enhancing the security of the communication entity, and improving the flexibility of the security state assessment.
如图 9所示, 所述网络系统包括:  As shown in FIG. 9, the network system includes:
第一通信实体 901 , 用于向第二通信实体 902发送通信请求, 将自身所信 任评估者的信息告知第二通信实体 902 , 获取第二评估者 904对第二通信实体 902的评估结果, 根据所述评估结果对第二通信实体 902做出响应;  The first communication entity 901 is configured to send a communication request to the second communication entity 902, notify the second communication entity 902 of the information of the evaluator that it trusts, and obtain the evaluation result of the second evaluator 904 by the second evaluator 904, according to The evaluation result is responsive to the second communication entity 902;
第二通信实体 902 , 用于接收来自第一通信实体 901的评估者的信息, 根 据第一通信实体 901所信任评估者的信息, 确定双方都信任的第一评估者 903 和第二评估者 904 , 获取第一评估者 903对第一通信实体 901的评估结果, 根据 所述评估结果对第一通信实体 901做出响应;  The second communication entity 902 is configured to receive information from the evaluator of the first communication entity 901, and determine, according to the information of the evaluator trusted by the first communication entity 901, the first evaluator 903 and the second evaluator 904 that both parties trust. Obtaining an evaluation result of the first communication entity 901 by the first evaluator 903, and responding to the first communication entity 901 according to the evaluation result;
第一评估者 903 , 用于获取第一通信实体 901的安全状态信息, 对第一通 信实体 901的安全状态进行评估, 得到评估结果;  The first evaluator 903 is configured to obtain security state information of the first communication entity 901, and evaluate the security state of the first communication entity 901 to obtain an evaluation result;
第二评估者 904 , 用于获取第二通信实体 902的安全状态信息, 对第二通 信实体 902的安全状态进行评估, 得到评估结果。  The second evaluator 904 is configured to obtain security status information of the second communication entity 902, and evaluate the security status of the second communication entity 902 to obtain an evaluation result.
本发明实施例的网络系统, 第一通信实体和第二通信实体协商确定各自 的评估者, 每个评估者根据自己评估的通信实体的安全状态信息, 对该通信 实体进行评估, 两通信实体根据评估结果对对侧通信实体做出响应。 与现有 技术相比, 两通信实体不需要将自己的安全状态信息公布给对侧通信实体, 避免了由于安全状态信息的泄漏而导致自身受到攻击, 充分保护了通信实体 的隐私, 增强了通信实体的安全性, 提高了安全状态评估的灵活性。  In the network system of the embodiment of the present invention, the first communication entity and the second communication entity negotiate to determine respective evaluators, and each evaluator evaluates the communication entity according to the security status information of the communication entity that it evaluates, and the two communication entities are The evaluation results respond to the contralateral communication entity. Compared with the prior art, the two communication entities do not need to advertise their own security status information to the opposite communication entity, thereby avoiding the attack due to the leakage of the security status information, fully protecting the privacy of the communication entity, and enhancing the communication. The security of the entity increases the flexibility of the assessment of the security status.
其中, 所述第一评估者 903和第二评估者 904分别包括:  The first evaluator 903 and the second evaluator 904 respectively include:
存储模块 905 , 用于存储已评估过的通信实体的评估结果。 所述存储模块中存储有已评估过的通信实体的评估结果, 一侧通信实体 可以直接从所述存储模块中获取评估者对另一侧通信实体的评估结果。 The storage module 905 is configured to store an evaluation result of the evaluated communication entity. The storage module stores the evaluation result of the evaluated communication entity, and the one-side communication entity can directly obtain the evaluation result of the evaluator from the other side communication entity from the storage module.
因而, 利用本发明的实施例网络系统, 能够充分保护通信实体的隐私, 增强了通信实体的安全性, 提高了安全状态评估的灵活性。  Therefore, with the network system of the embodiment of the present invention, the privacy of the communication entity can be fully protected, the security of the communication entity is enhanced, and the flexibility of the security state evaluation is improved.
本发明的所有实施例均可以适用于机场、 咖啡厅、 图书馆等场景中的临 时终端的网络接入服务。 例如, 在机场中, 旅客的笔记本、 PDA等在请求接入 机场的网络管理服务器前, 为了保护自己的隐私和安全, 需要和机场的网络 管理服务器协商确定双方都信任的第三方评估者, 由第三方评估者对旅客的 笔记本、 PDA等进行安全状态评估; 同样, 机场的网络管理服务器为了保护自 己不受非法接入用户的攻击, 将会和旅客的笔记本、 PDA等协商确定双方都信 任的第三方评估者, 由第三方评估者对机场的网络管理服务器进行安全状态 评估。 其中, 所述第三方评估者可以为网络上的服务器等网络设备。  All of the embodiments of the present invention can be applied to network access services of temporary terminals in airports, cafes, libraries, and the like. For example, in an airport, a passenger's laptop, PDA, etc., in order to protect their privacy and security before requesting access to the airport's network management server, need to negotiate with the airport's network management server to determine the third-party evaluators trusted by both parties. Third-party evaluators evaluate the security status of passengers' laptops, PDAs, etc. Similarly, the airport's network management server will negotiate with passengers' laptops, PDAs, etc. to ensure that both parties trust in order to protect themselves from unauthorized access. A third-party evaluator, a third-party evaluator conducts a security status assessment of the airport's network management server. The third-party evaluator may be a network device such as a server on the network.
本领域普通技术人员可以意识到, 结合本文中所公开的实施例描述的各 示例的单元及算法步骤, 能够以电子硬件、 计算机软件或者二者的结合来实 现, 为了清楚地说明硬件和软件的可互换性, 在上述说明中已经按照功能一 般性地描述了各示例的组成及步骤。 这些功能究竟以硬件还是软件方式来执 行, 取决于技术方案的特定应用和设计约束条件。 专业技术人员可以对每个 特定的应用来使用不同方法来实现所描述的功能, 但是这种实现不应认为超 出本发明的范围。  Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the various examples described in connection with the embodiments disclosed herein can be implemented in electronic hardware, computer software or a combination of both, in order to clearly illustrate hardware and software. Interchangeability, the composition and steps of the various examples have been generally described in terms of function in the above description. Whether these functions are performed in hardware or software depends on the specific application and design constraints of the solution. A person skilled in the art can use different methods for implementing the described functions for each particular application, but such implementation should not be considered to be beyond the scope of the present invention.
结合本文中所公开的实施例描述的方法或算法的步骤可以用硬件、 处理 器执行的软件模块, 或者二者的结合来实施。 软件模块可以置于随机存储器 ( RAM ), 内存、 只读存储器(R0M )、 电可编程 R0M、 电可擦除可编程 R0M、 寄 存器、 硬盘、 可移动磁盘、 CD-R0M、 或技术领域内所公知的任意其它形式的 存储介质中。  The steps of a method or algorithm described in connection with the embodiments disclosed herein can be implemented in hardware, a software module executed by a processor, or a combination of both. Software modules can be placed in random access memory (RAM), memory, read-only memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, removable disk, CD-ROM, or technical field Any other form of storage medium known.
以上所述, 仅为本发明实施例的具体实施方式, 但本发明实施例的保护 范围并不局限于此, 任何熟悉本技术领域的技术人员在本发明揭露的技术范 围内, 可轻易想到的变化或替换, 都应涵盖在本发明的保护范围之内。 因此, 本发明实施例的保护范围应该以权利要求的保护范围为准。 The foregoing is only a specific embodiment of the embodiments of the present invention, but the scope of protection of the embodiments of the present invention is not limited thereto, and any technical person disclosed by the skilled person in the technical field disclosed in the present invention Variations or substitutions that are conceivable within the scope of the invention are intended to be encompassed within the scope of the invention. Therefore, the scope of protection of the embodiments of the present invention should be determined by the scope of protection of the claims.

Claims

权利 要求 书 Claim
1、 一种安全状态评估方法, 其特征在于, 包括: A method for evaluating a security state, comprising:
响应方接收来自请求方的通信请求, 以及所述请求方所信任评估者的信息; 根据所述评估者的信息, 所述响应方或请求方确定双方都信任的评估者; 所述响应方获取所述评估者对所述请求方的安全状态评估结果, 所述安全 状态评估结果由所述评估者根据来自请求方的安全状态信息获取;  The responder receives the communication request from the requesting party and the information of the evaluator trusted by the requesting party; according to the evaluator's information, the responding party or the requesting party determines an evaluator that both parties trust; the responding party obtains The evaluator evaluates the security status of the requesting party, and the security status assessment result is obtained by the evaluator according to the security status information from the requesting party;
所述响应方根据所述评估结果对所述请求方的通信请求做出响应。  The responder responds to the requesting party's communication request according to the evaluation result.
2、 根据权利要求 1所述的安全状态评估方法, 其特征在于, 所述响应方或 请求方确定双方都信任的评估者的步骤包括:  2. The security state assessment method according to claim 1, wherein the step of the responder or the requestor determining the evaluator trusted by both parties comprises:
响应方根据请求方所信任评估者的信息, 选择双方都信任的评估者; 或者, 响应方将自身所信任评估者的信息发送给请求方, 由请求方选择双方都信 任的评估者。  The responder selects an evaluator that both parties trust based on the information of the evaluator trusted by the requesting party; or, the responder sends the information of the evaluator that it trusts to the requesting party, and the requesting party selects the evaluator to which both parties trust.
3、 根据权利要求 1所述的安全状态评估方法, 其特征在于, 所述安全状态 评估结果由所述评估者根据来自请求方的安全状态信息获取的步骤包括:  3. The security state assessment method according to claim 1, wherein the step of obtaining the security state assessment result by the evaluator according to the security state information from the requesting party comprises:
评估者根据所述安全状态信息对所述请求方进行评估; 或者,  The evaluator evaluates the requestor according to the security status information; or
评估者提取自身所存储的对所述请求方的评估结果。  The evaluator extracts the evaluation results stored by itself on the requesting party.
4、 根据权利要求 3所述的安全状态评估方法, 其特征在于,所述评估者根据 所述安全状态信息对所述请求方进行评估的步骤包括:  The security state evaluation method according to claim 3, wherein the step of evaluating the requester by the evaluator according to the security status information comprises:
评估者按照自身提供的策略, 根据所述安全状态信息对所述请求方进行评 估; 或者,  The evaluator evaluates the requestor according to the security status information according to a policy provided by itself; or
评估者按照响应方提供的策略, 根据所述安全状态信息对所述请求方进行 评估。  The evaluator evaluates the requestor based on the security status information in accordance with a policy provided by the responder.
5、 根据权利要求 1所述的安全状态评估方法, 其特征在于, 所述响应方获 取所述评估者对所述请求方的安全状态评估结果的步骤包括:  The security state evaluation method according to claim 1, wherein the step of the responder obtaining the evaluation result of the security status of the requester by the evaluator includes:
响应方向评估者请求对请求方的评估结果; 或者,  The response direction evaluator requests an evaluation result of the requesting party; or
评估者将评估结果发送给请求方, 请求方将带有评估者标识的评估结果发 给响应方。 The evaluator sends the evaluation result to the requesting party, and the requesting party sends the evaluation result with the evaluator identification To the responder.
6、 根据权利要求 1至 5中任一项所述的安全状态评估方法, 其特征在于, 所 述安全状态信息包括:  The security state evaluation method according to any one of claims 1 to 5, wherein the security state information comprises:
请求方所安装操作系统的版本信息、 补丁信息、 防火墙版本信息、 杀毒软 件版本信息或浏览器版本信息。  Version information, patch information, firewall version information, anti-virus software version information, or browser version information of the operating system installed by the requester.
7、 一种安全状态评估方法, 其特征在于, 包括:  7. A method for assessing a safety state, comprising:
第二通信实体接收来自第一通信实体的通信请求, 以及第一通信实体所信 任评估者的信息;  The second communication entity receives the communication request from the first communication entity and the information of the evaluator trusted by the first communication entity;
根据第一通信实体所信任评估者的信息, 第二通信实体或第一通信实体确 定双方都信任的第一评估者和第二评估者;  The second communicating entity or the first communicating entity determines the first evaluator and the second evaluator that both parties trust based on the information of the evaluator trusted by the first communicating entity;
第二通信实体获取第一评估者对第一通信实体的评估结果, 所述第一评估 者对第一通信实体的评估结果由第一评估者根据来自第一通信实体的安全状态 信息获取;  The second communication entity obtains an evaluation result of the first communication entity by the first evaluator, and the evaluation result of the first evaluator by the first evaluator is obtained by the first evaluator according to the security status information from the first communication entity;
第二通信实体根据所述评估结果对第一通信实体做出响应;  The second communication entity responds to the first communication entity according to the evaluation result;
第一通信实体获取第二评估者对第二通信实体的评估结果, 所述第二评估 者对第二通信实体的评估结果由第二评估者根据来自第二通信实体的安全状态 信息获取;  The first communication entity acquires an evaluation result of the second communication entity by the second evaluator, and the evaluation result of the second evaluator by the second evaluator is obtained by the second evaluator according to the security status information from the second communication entity;
第一通信实体根据所述评估结果对第二通信实体做出响应。  The first communicating entity responds to the second communicating entity based on the evaluation result.
8、 根据权利要求 7所述的安全状态评估方法, 其特征在于, 所述第一评估 者对第一通信实体的评估结果由第一评估者根据来自第一通信实体的安全状态 信息获取的步骤包括:  8. The security state evaluation method according to claim 7, wherein the first evaluator obtains the evaluation result of the first communication entity by the first evaluator according to the security state information obtained from the first communication entity. Includes:
第一评估者根据所述来自第一通信实体的安全状态信息对第一通信实体进 行评估; 或者,  The first evaluator evaluates the first communicating entity based on the security status information from the first communicating entity; or
第一评估者提取自身所存储的对所述第一通信实体的评估结果。  The first evaluator extracts the evaluation results stored by itself for the first communicating entity.
9、 根据权利要求 7所述的安全状态评估方法, 其特征在于, 所述第二评估 者对第二通信实体的评估结果由第二评估者根据来自第二通信实体的安全状态 信息获取的步骤包括: 9. The security state assessment method according to claim 7, wherein the evaluation result of the second evaluator by the second evaluator is determined by the second evaluator according to the security state from the second communication entity. The steps for obtaining information include:
第二评估者根据所述来自第二通信实体的安全状态信息对第二通信实体进 行评估; 或者,  The second evaluator evaluates the second communicating entity based on the security status information from the second communicating entity; or
第二评估者提取自身所存储的对所述第二通信实体的评估结果。  The second evaluator extracts the evaluation result stored by itself for the second communication entity.
10、 一种网络设备, 其特征在于, 包括:  10. A network device, comprising:
安全状态信息获取单元(701) , 用于获取第一通信实体的安全状态信息; 评估单元(702) , 用于根据所述安全状态信息, 对所述第一通信实体进行安 全状态评估, 将评估结果发送给与所述第一通信实体通信的第二通信实体, 由 所述第二通信实体根据所述评估结果对所述被评估的通信实体做出响应。  a security status information obtaining unit (701), configured to obtain security status information of the first communication entity, and an evaluation unit (702), configured to perform security status assessment on the first communication entity according to the security status information, and The result is sent to a second communication entity in communication with the first communication entity, the second communication entity responding to the evaluated communication entity based on the evaluation result.
11、 根据权利要求 10所述的网络设备, 其特征在于,所述网络设备还包括: 存储单元(703) , 用于存储已评估过的通信实体的评估结果。  The network device according to claim 10, wherein the network device further comprises: a storage unit (703), configured to store an evaluation result of the evaluated communication entity.
12、 一种网络系统, 其特征在于, 包括:  12. A network system, comprising:
请求方(801) , 用于向响应方(802)请求建立通信, 将自己所信任评估者的 信息告知响应方(802) ;  The requesting party (801) is configured to request the responding party (802) to establish communication, and inform the responding party of the information of the evaluator that it trusts (802);
响应方(802) , 用于接收请求方(801)发送来的评估者的信息, 根据所述评 估者的信息, 确定双方都信任的评估者(803) , 获取所述评估者(803)对请求方 (801)的评估结果, 根据所述评估结果对请求方(801)做出响应;  The responder (802) is configured to receive information of the evaluator sent by the requesting party (801), determine an evaluator (803) trusted by both parties according to the evaluator's information, and obtain the evaluator (803) pair. The evaluation result of the requesting party (801), responding to the requesting party (801) according to the evaluation result;
评估者(803) , 用于获取请求方(801)的安全状态信息, 对请求方(801)的安 全状态进行评估, 得到评估结果。  The evaluator (803) is configured to obtain security status information of the requesting party (801), and evaluate the security status of the requesting party (801) to obtain an evaluation result.
13、 根据权利要求 12所述的网络系统, 其特征在于,所述评估者(803)包括: 存储模块(804) , 用于存储已评估过的请求方(801)的评估结果。  13. The network system according to claim 12, wherein the evaluator (803) comprises: a storage module (804) configured to store an evaluation result of the evaluated requestor (801).
14、 一种网络系统, 其特征在于, 包括:  14. A network system, comprising:
第一通信实体(901) , 用于向第二通信实体(902)发送通信请求, 将自身所 信任评估者的信息告知第二通信实体(902) , 获取第二评估者(904)对第二通信 实体(902)的评估结果, 根据所述评估结果对第二通信实体(902)做出响应; 第二通信实体(902) , 用于接收来自第一通信实体(901)的评估者的信息, 根据第一通信实体(901)所信任评估者的信息, 确定双方都信任的第一评估者 (903)和第二评估者(904) , 获取第一评估者(903)对第一通信实体(901)的评估 结果, 根据所述评估结果对第一通信实体(901)做出响应; The first communication entity (901) is configured to send a communication request to the second communication entity (902), notify the second communication entity (902) of the information of the evaluator trusted by itself, and obtain the second evaluator (904) to the second The evaluation result of the communication entity (902) responds to the second communication entity (902) according to the evaluation result; the second communication entity (902) is configured to receive information from the evaluator of the first communication entity (901) , Determining, by the information of the evaluator trusted by the first communication entity (901), a first evaluator (903) and a second evaluator (904) that both parties trust, and obtaining a first evaluator (903) for the first communicating entity ( The evaluation result of 901), responding to the first communication entity (901) according to the evaluation result;
第一评估者(903) , 用于获取第一通信实体(901)的安全状态信息, 对第一 通信实体(901)的安全状态进行评估, 得到评估结果;  a first evaluator (903), configured to obtain security status information of the first communication entity (901), and evaluate a security status of the first communication entity (901) to obtain an evaluation result;
第二评估者(904) , 用于获取第二通信实体(902)的安全状态信息, 对第二 通信实体(902)的安全状态进行评估, 得到评估结果。  The second evaluator (904) is configured to obtain security status information of the second communication entity (902), and evaluate the security status of the second communication entity (902) to obtain an evaluation result.
15、 根据权利要求 14所述的网络系统, 其特征在于,所述第一评估者(903) 和第二评估者(904)包括:  15. The network system of claim 14, wherein the first evaluator (903) and the second evaluator (904) comprise:
存储模块(905) , 用于存储已评估过的通信实体的评估结果。  The storage module (905) is configured to store the evaluation result of the evaluated communication entity.
PCT/CN2009/071747 2008-05-15 2009-05-12 A safety status estimate method, network apparatus and network system WO2009138026A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200810097589.6 2008-05-15
CNA2008100975896A CN101582810A (en) 2008-05-15 2008-05-15 Secure state evaluating method, network equipment and network system

Publications (1)

Publication Number Publication Date
WO2009138026A1 true WO2009138026A1 (en) 2009-11-19

Family

ID=41318364

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/071747 WO2009138026A1 (en) 2008-05-15 2009-05-12 A safety status estimate method, network apparatus and network system

Country Status (2)

Country Link
CN (1) CN101582810A (en)
WO (1) WO2009138026A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102215211B (en) * 2010-04-02 2016-01-20 中兴通讯股份有限公司 The security policy negotiation method and system of communication means, the access of support trustable network
WO2017015276A1 (en) * 2015-07-22 2017-01-26 Avg Netherlands B.V Content access validation system and method
CN110162958B (en) * 2018-10-18 2023-04-18 腾讯科技(深圳)有限公司 Method, apparatus and recording medium for calculating comprehensive credit score of device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1536807A (en) * 2003-04-07 2004-10-13 西科姆株式会社 Document safety transfer system and method
CN1691603A (en) * 2004-04-28 2005-11-02 联想(北京)有限公司 A method for implementing equipment group and intercommunication between grouped equipments
US20060015717A1 (en) * 2004-07-15 2006-01-19 Sony Corporation And Sony Electronics, Inc. Establishing a trusted platform in a digital processing system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1536807A (en) * 2003-04-07 2004-10-13 西科姆株式会社 Document safety transfer system and method
CN1691603A (en) * 2004-04-28 2005-11-02 联想(北京)有限公司 A method for implementing equipment group and intercommunication between grouped equipments
US20060015717A1 (en) * 2004-07-15 2006-01-19 Sony Corporation And Sony Electronics, Inc. Establishing a trusted platform in a digital processing system

Also Published As

Publication number Publication date
CN101582810A (en) 2009-11-18

Similar Documents

Publication Publication Date Title
US10581907B2 (en) Systems and methods for network access control
Zhang et al. Security and trust issues in fog computing: A survey
US11159558B2 (en) Mobile risk assessment
US11134386B2 (en) Device identification for management and policy in the cloud
US10511607B2 (en) Multidimensional risk profiling for network access control of mobile devices through a cloud based security system
US11843577B2 (en) Fingerprinting to identify devices and applications for use in management and policy in the cloud
US20180219917A1 (en) Recommendations for security associated with accounts
US9286444B2 (en) Next generation secure gateway
US9100432B2 (en) Cloud-based distributed denial of service mitigation
US9137203B2 (en) Centralized secure offload of cryptographic security services for distributed security enforcement points
US8104077B1 (en) System and method for adaptive end-point compliance
US20090077631A1 (en) Allowing a device access to a network in a trusted network connect environment
CN111131176B (en) Resource access control method, device, equipment and storage medium
CN108605264B (en) Method and apparatus for network management
EP3545451B1 (en) Automatic forwarding of access requests and responses thereto
Varadharajan et al. Counteracting security attacks in virtual machines in the cloud using property based attestation
Modarresi et al. A framework for improving network resilience using SDN and fog nodes
WO2009138026A1 (en) A safety status estimate method, network apparatus and network system
US20240031334A1 (en) Identity firewall with context information tracking
GB2559821A (en) Secure access by behavior recognition

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09745410

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09745410

Country of ref document: EP

Kind code of ref document: A1