CN109413107A - A kind of credible platform connection method - Google Patents
A kind of credible platform connection method Download PDFInfo
- Publication number
- CN109413107A CN109413107A CN201811548214.7A CN201811548214A CN109413107A CN 109413107 A CN109413107 A CN 109413107A CN 201811548214 A CN201811548214 A CN 201811548214A CN 109413107 A CN109413107 A CN 109413107A
- Authority
- CN
- China
- Prior art keywords
- platform
- user
- gateway
- access
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/141—Setup of application sessions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to a kind of credible platform connection methods, identify including user identity identification, platform security and according to identification result control network connection, using credible network connecting construction, in conjunction with user behavior analysis, realize that the user identity that network is accessed under Windows environment identifies, bi-directional platform identifies and completeness of platform identifies, Windows server is enabled to carry out authentic authentication to the behavior of access terminal, decide whether to allow the network request of safety to access according to identification result, to realize believable network connection.
Description
Technical field
The present invention relates to computer safety fields, and in particular to a kind of credible platform connection method.
Background technique
Currently, in individual office desktop operating system field, although receiving the challenge of more and more novel products,
It is that Windows system still occupies dominant position, occupation rate of market is up to 91.41%.The Mac OS X occupation rate of apple is then
It is 6.32%, and Linux occupation rate only has 2.27%.
The favor of Global Subscriber is won at Windows system interface intuitive with its, succinct, generous, but Windows system
There is also some problems, such as the opacity of Windows own system, and unknown loophole to be caused to be grown thickly for itself, outburst in May
Extorting virus event is even more good illustration.In addition Windows is when being connected to the network, mainly using TNC connection framework by
Framework is verified using unidirectional completeness of platform in TNC, not only the credibility two-way to connecting platform not can guarantee, but also to access
The credibility of platform behavior not can guarantee.
Summary of the invention
For the above-mentioned problems in the prior art, for the present invention towards Windows environment, proposing corresponding network can
Believe connection framework, guarantees the credible connection of Windows.
A kind of credible platform connection method characterized by comprising
Step S1, user identity identifies, wherein identifying by gateway to user identity, enters step if if identifying
Otherwise rapid S2 forbids this attended operation;
Step S2, platform security identifies, and the content of identification includes the behavioural information of system and the integrality degree of platform
Magnitude enters step S3 after the completion of identifying;
Step S3, it is controlled and is connected to the network according to identification result, if identification result is qualification, current network is allowed to connect,
Otherwise refusal current network connection.
Preferably, the step S1 further include:
Step S11, connection prepares: before connection starts, Windows terminal and server incoming end passes through binding TPCM phase
It closes interface and carries out integrality collection;
Step S12, user sends network insertion request to gateway;
Step S13, user and gateway carry out user identity identification: being negotiated based on trusted third party authentication center by code key
Agreement establishes communication code key Key, and after communication code key is established, user encrypts relevant information U by code key, is sent to gateway, net
It after closing decryption, compares, is identified with stored information, enter step S2 if if identifying, otherwise refuse the access
Request.
Preferably, the step S2 further include:
Step S21, user sends platform identification request to Windows terminal, and gateway sends platform to server-side access point
Identify request;
Step S22, after server-side access point receives platform identification request, it is flat that at least one wheel is executed with Third Party Authentication center
Platform authentication protocol realizes that the platform between access requestor and access control person identifies;
Step S23, in platform discrimination process, Windows terminal and service terminate the IF-IMC interface that access point passes through platform
Each IMC of standard and TPCM carry out information exchange, obtain the integrity information M of platform, trusted third party is connect by IF-IMC
Mouth standard and the IMC of storage carry out information exchange and obtain standard value information M '.
Preferably, the integrity information M further include:
Hard disk information, memory information, operating system version, important patch, the network information, associated drives.
Preferably, after the step S23 further include:
Step S24, TPCM calls IF-AGC interface to be collected the behavior of system;
Step S25, the completeness check interface of storage calls in trusted third party, to the completeness of platform degree of user and gateway
Magnitude is verified and is assessed, and trusted third party generates the completeness of platform assessment result of user and gateway according to assessment strategy,
Windows terminal and service termination access point are sent by completeness of platform result.
Preferably, the behavior further include:
Under the current running environment of computer, whether application operating meets rule, with the presence or absence of unauthorized access, operation sequence
Arrange at least one of whether legal, network request situation.
Preferably, the platform integrity metric value to user and gateway verifies and assessment includes:
Whether integrity information M and M ' the standard value information for verifying the platform is identical.
Preferably, the step S3 further include:
The assessment result that step 31, Windows terminal and service termination access point are generated according to trusted third party respectively generates
Access decision is sent respectively to user and gateway;
Step 32, user and gateway execute access control according to the access decision of generation, and gateway is determined according to the access of generation
Plan controls access of the user to protected network, and user decides whether to be connected to the shielded net according to the access decision of generation
Network, to realize that Windows trustable network connects.
The present invention relates to a kind of credible platform connection methods, including user identity identifies, platform security identifies and root
According to identification result control network connection, realized using credible network connecting construction in conjunction with user behavior analysis
The user identity identification, bi-directional platform identification and completeness of platform that network is accessed under Windows environment identify, and Windows is enabled to take
Device be engaged in the behavior progress authentic authentication of access terminal, decides whether to allow the network request of safety to access according to identification result,
To realize believable network connection.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
Fig. 1 is a kind of architecture diagram of credible platform connection system in the embodiment of the present invention one;
Fig. 2 is a kind of flow chart of credible platform connection method in the embodiment of the present invention three.
Specific embodiment
Now in conjunction with attached drawing, elaborate to presently preferred embodiments of the present invention.
Embodiment one
The present embodiment proposes a kind of credible platform connection system, as shown in Figure 1, including access requestor, access control
Device and trusted third party, wherein the access requestor and the access controller carry out two-way body by the trusted third party
Part identifies and credible platform assessment, the system specifically include:
(1) access requestor
Access requestor function specifically includes that initiation network access request, realizes and reflects with the bidirectional identification of access controller
Not;The integrality of Windows access terminal is collected, integrity measurement report is generated, is completed double with access controller
It is assessed to completeness of platform;Meanwhile Windows application behavior is collected, corresponding measurement report is generated, tactful pipe is sent to
Manage device.
Access requestor includes following functions module: Windows access requestor, Windows application behavior gatherer,
TPCM, Windows terminal, user.
(2) access controller
Access controller major function includes realizing to identify with the bidirectional identification of access requestor, is realized to access requestor
Credible evaluation, meanwhile, realize and the behavior of server-side access point collected;Receive the integrity measurement of Windows access terminal
Value completes that these metrics are sent to authentic authentication center to the integrity measurement value of server-side access point.To access point row
It is collected for integrality, sends tactical management center for measurement results.
Access controller mainly comprises the following modules: Windows access controller, access requestor, incoming end TPCM, clothes
Business device incoming end, gateway.
(3) trusted third party
Trusted third party's major function is served as in bidirectional identification discrimination process in access requestor and access controller
Trusted third party verifies both sides' certificate validity;Completeness of platform, the server of Windows access terminal are accessed
The completeness of platform at end carries out verification assessment, forms measurement report, and carry out measurement to its behavior integrality and verify.
Trusted third party mainly comprises the following modules: Windows V&V of behavior person, integrity measurement verifier is credible to recognize
Card center.
The functional component being related in the credible platform connection system is explained below:
(1) user
User is responsible for initiating network request, and completes to identify with the bidirectional identification of gateway under heart assist in authentic authentication,
Access controller and trusted third party, and the visit issued according to identity identification result and upper layer are sent by upper layer protocol data packet
Ask that control strategy realizes access control.
(2) gateway
Gateway receives Client-initiated network request, and is realized by trusted third party and identified with the bidirectional identification of user,
Trusted third party is sent by upper layer protocol data packet, the access control policy issued according to identity identification result and upper layer is realized
To the access control of user network request.
(3) authentic authentication center
Identify in the bidirectional identification of user and gateway and serves as trusted third party in credible platform evaluation process.
(4) Windows terminal
Integrity information is requested and collected to assessment layer, realizes that credible platform integrality is commented in the case where authentic authentication center helps
Estimate.
(5) server-side access point
Integrity information is requested and collected to the integrity information for receiving Windows terminal to assessment layer, in authentic authentication
The heart helps the lower credible platform integrity assessment realized with Windows terminal.The integrity assessment plan that trusted third party is generated
Slightly it is sent to gateway.
(6)TPCM
It realizes that the integrality of terminal and incoming end is collected, generates corresponding integrity report.Interface is collected in calling behavior, right
The behavior integrality of Windows application is collected.
(7) completeness check person
Verification assessment is carried out to the integrality of the Windows terminal and service termination access point that receive.
(8) Windows application behavior gatherer
Collect the behavior integrality of Windows terminal applies.
(9) Windows application behavior requestor
Collect the behavior integrality of server-side access point.
(10) Windows application V&V of behavior person
The behavior integrality of behavior integrality and access point to terminal carries out verification assessment.
The present embodiment proposes a kind of credible platform connection system towards Windows environment, is connected using trustable network
Framework, in conjunction with user behavior analysis, realize that the user identity that network is accessed under Windows environment identifies, bi-directional platform identifies and
Completeness of platform identifies, and decides whether to allow the network request of safety to access according to identification result, to realize believable network
Connection.
Embodiment two
System is connected based on a kind of credible platform proposed in embodiment one, the present embodiment is to its software system architecture level
It is illustrated, the system comprises NS software layer, credible platforms to assess layer, integrity measurement layer and behavior collecting layer,
Above system framework layer specifically includes:
(1) NS software layer
The function of NS software layer realizes Windows access request with the help of being mainly included in authentic authentication center
The bidirectional identification of person and Windows access controller identifies, and realizes access control according to the assessment strategy of identification result and assessment layer
System.
(2) credible platform assesses layer
Credible platform assessment layer mainly realizes the completeness of platform assessment school of Windows access terminal and service termination access point
It tests.Serve as trusted third party in authentic authentication center.Windows terminal and service termination access point call the relevant interface of measurement layer,
Completeness of platform information is obtained, authentic authentication center is sent to, the integrality in completeness check layer is called at authentic authentication center
Verifier interface verifies the integrality of terminal and access point.
(3) integrity measurement layer
Integrity measurement layer mainly realizes that the completeness of platform to Windows access terminal and service termination access point is received
Collection, and generate corresponding integrity report.Integrality collects the completeness check person for completing to be sent to trusted third party and carries out school
It tests.
(4) behavior collecting layer
The collection of window networking behavior is realized in behavior collecting layer, and the platform of terminal and incoming end is pacified when to network insertion
Full behavior is collected, relevant safety behavior include using whether meet rule, with the presence or absence of the unauthorized access of application, to behaviour
It is whether correct etc. to make sequence.
Embodiment three
Based on system software architecture in the credible platform connection system and embodiment two in embodiment one, the present embodiment is proposed
A kind of credible platform connection method, as shown in Fig. 2, including that user identity identifies, platform security identifies and according to identification
As a result three big steps of control network connection, the detailed process of the method are as follows:
1) connection prepares: before connection starts, Windows terminal and server incoming end passes through binding TPCM relevant interface
Carry out integrality collection;
2) user sends network insertion request to gateway;
3) user and gateway carry out user identity identification.Pass through code key agreement protocol based on trusted third party authentication center,
Communication code key Key is established, after communication code key is established, user encrypts relevant information U (id, password) by code key, sends
It compares, is identified with stored information after gateway decryption to gateway, enter step 4) if if identifying, otherwise refuse
The access request;
4) user sends platform identification request to Windows terminal, and gateway sends platform identification to server-side access point and asks
It asks;
5) after server-side access point receives platform identification request, a wheel is executed with Third Party Authentication center or takes turns platform mirror more
Other agreement realizes that the platform between access requestor and access control person identifies;
6) in platform discrimination process, Windows terminal and service termination access point pass through each of the IF-IMC and TPCM of platform
A IMC carries out information exchange, obtains integrity information M (hard disk information, memory information, operating system version, the important benefit of platform
Fourth, the network information, associated drives etc.), trusted third party carries out information exchange by IF-IMC and the IMC of storage and obtains standard value
Information M ';
7) in platform discrimination process, other than platform essential information, it is also necessary to the multidate information of collection system, i.e. behavior letter
Breath.TPCM calls IF-AGC interface to be collected behavior, and behavior includes the current running environment of computer, such as application operating
Whether rule is met, with the presence or absence of unauthorized access, whether legal, the network request situation of the sequence of operation etc.;
8) in platform discrimination process, the completeness check interface of storage calls in trusted third party, to user and gateway
Platform integrity metric value is verified and is assessed (i.e. verifying M==M '), and trusted third party generates user according to assessment strategy
With the completeness of platform assessment result of gateway, Windows terminal and service termination access point are sent by completeness of platform result;
9) assessment result that Windows terminal and service termination access point are generated according to trusted third party respectively generates access and determines
Plan is sent respectively to user and gateway;
10) user and gateway execute access control according to the access decision of generation, and gateway is according to the access decision control of generation
System (the allow, refusal) access of user to protected network, user according to the access decision of generation decide whether to be connected to this by
The network of protection, to realize that Windows trustable network connects.
The invention proposes a kind of credible platforms to connect system and method, using credible network connecting construction, in conjunction with user
Behavioural analysis realizes that the user identity that network is accessed under Windows environment identifies, bi-directional platform identifies and completeness of platform mirror
Not, it enables Windows server carry out authentic authentication to the behavior of access terminal, is decided whether to allow safety according to identification result
Network request access, to realize believable network connection.
In several embodiments provided by the present invention, it should be understood that disclosed method and terminal can pass through it
Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the module, only
Only a kind of logical function partition, there may be another division manner in actual implementation.
In addition, the technical solution in above-mentioned several embodiments can be combined with each other and replace in the case where not conflicting
It changes.
The module as illustrated by the separation member may or may not be physically separated, aobvious as module
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.Some or all of the modules therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
It, can also be in addition, each functional module in each embodiment of the present invention can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of hardware adds software function module.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie
In the case where without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter
From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power
Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims
Variation is included in the present invention.Any attached associated diagram label in claim should not be considered as right involved in limitation to want
It asks.Furthermore, it is to be understood that one word of " comprising " does not exclude other units or steps, odd number is not excluded for plural number.It is stated in system claims
Multiple modules or device can also be implemented through software or hardware by a module or device.The first, the second equal words
It is used to indicate names, and does not indicate any particular order.
Finally it should be noted that the above examples are only used to illustrate the technical scheme of the present invention and are not limiting, although reference
Preferred embodiment describes the invention in detail, those skilled in the art should understand that, it can be to of the invention
Technical solution is modified or equivalent replacement, without departing from the spirit and scope of the technical solution of the present invention.
Claims (8)
1. a kind of credible platform connection method characterized by comprising
Step S1, user identity identifies, wherein being identified by gateway to user identity, enters step if if identifying
Otherwise S2 forbids this attended operation;
Step S2, platform security identifies, and the content of identification includes the behavioural information of system and the integrity measurement value of platform,
S3 is entered step after the completion of identifying;
Step S3, it is controlled and is connected to the network according to identification result, if identification result is qualification, allow current network to connect, otherwise
Refuse current network connection.
2. a kind of credible platform connection method according to claim 1, which is characterized in that the step S1 further include:
Step S11, connection prepares: before connection starts, Windows terminal and server incoming end is connect by binding TPCM correlation
Mouth carries out integrality collection;
Step S12, user sends network insertion request to gateway;
Step S13, user and gateway carry out user identity identification: negotiating to assist by code key based on trusted third party authentication center
View establishes communication code key Key, and after communication code key is established, user encrypts relevant information U by code key, is sent to gateway, gateway
It after decryption, compares, is identified with stored information, enter step S2 if if identifying, otherwise refuse the access and ask
It asks.
3. a kind of credible platform connection method according to claim 1, which is characterized in that the step S2 further include:
Step S21, user sends platform identification request to Windows terminal, and gateway sends platform to server-side access point and identifies
Request;
Step S22, after server-side access point receives platform identification request, at least one wheel platform mirror is executed with Third Party Authentication center
Other agreement realizes that the platform between access requestor and access control person identifies;
Step S23, in platform discrimination process, Windows terminal and service terminate the IF-IMC interface standard that access point passes through platform
Information exchange is carried out with each IMC of TPCM, obtains the integrity information M of platform, trusted third party passes through IF-IMC interface mark
The quasi- IMC with storage carries out information exchange and obtains standard value information M '.
4. a kind of credible platform connection method according to claim 3, which is characterized in that the integrity information M is also
Include:
Hard disk information, memory information, operating system version, important patch, the network information, associated drives.
5. a kind of credible platform connection method according to claim 3, which is characterized in that also wrapped after the step S23
It includes:
Step S24, TPCM calls IF-AGC interface to be collected the behavior of system;
Step S25, the completeness check interface of storage calls in trusted third party, to the platform integrity metric value of user and gateway
It is verified and is assessed, trusted third party generates the completeness of platform assessment result of user and gateway according to assessment strategy, will put down
Platform integrity result is sent to Windows terminal and service termination access point.
6. a kind of credible platform connection method according to claim 5, which is characterized in that the behavior further include:
Under the current running environment of computer, whether application operating meets rule, is with the presence or absence of unauthorized access, the sequence of operation
At least one of no legal, network request situation.
7. a kind of credible platform connection method according to claim 5, which is characterized in that described to be put down to user and gateway
Platform integrity measurement value carries out verification and assessment includes:
Whether integrity information M and M ' the standard value information for verifying the platform is identical.
8. a kind of credible platform connection method according to claim 1, which is characterized in that the step S3 further include:
The assessment result that step 31, Windows terminal and service termination access point are generated according to trusted third party respectively generates access
Decision is sent respectively to user and gateway;
Step 32, user and gateway execute access control according to the access decision of generation, and gateway is according to the access decision control of generation
Access of the user processed to protected network, user decide whether to be connected to the shielded network according to the access decision of generation,
To realize that Windows trustable network connects.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811548214.7A CN109413107A (en) | 2018-12-18 | 2018-12-18 | A kind of credible platform connection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811548214.7A CN109413107A (en) | 2018-12-18 | 2018-12-18 | A kind of credible platform connection method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109413107A true CN109413107A (en) | 2019-03-01 |
Family
ID=65460919
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811548214.7A Pending CN109413107A (en) | 2018-12-18 | 2018-12-18 | A kind of credible platform connection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109413107A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111917760A (en) * | 2020-07-28 | 2020-11-10 | 国家工业信息安全发展研究中心 | Network collaborative manufacturing cross-domain fusion trust management and control method based on identification analysis |
CN112445537A (en) * | 2020-12-11 | 2021-03-05 | 中国科学院信息工程研究所 | Trusted starting method and device of operating system, mobile terminal and storage medium |
CN113794685A (en) * | 2021-08-16 | 2021-12-14 | 可信计算科技(无锡)有限公司 | Data transmission method and device based on credible evaluation |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101136928A (en) * | 2007-10-19 | 2008-03-05 | 北京工业大学 | Reliable network access framework |
KR20080050214A (en) * | 2006-12-01 | 2008-06-05 | 한국전자통신연구원 | Network authentication apparatus and method using integrity information of platform |
CN101350721A (en) * | 2007-07-20 | 2009-01-21 | 华为技术有限公司 | Network system, network access method and network appliance |
CN102035837A (en) * | 2010-12-07 | 2011-04-27 | 中国科学院软件研究所 | Method and system for hierarchically connecting trusted networks |
CN103581203A (en) * | 2013-11-20 | 2014-02-12 | 北京可信华泰信息技术有限公司 | Trusted network connection method based on trusted computing |
-
2018
- 2018-12-18 CN CN201811548214.7A patent/CN109413107A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20080050214A (en) * | 2006-12-01 | 2008-06-05 | 한국전자통신연구원 | Network authentication apparatus and method using integrity information of platform |
CN101350721A (en) * | 2007-07-20 | 2009-01-21 | 华为技术有限公司 | Network system, network access method and network appliance |
CN101136928A (en) * | 2007-10-19 | 2008-03-05 | 北京工业大学 | Reliable network access framework |
CN102035837A (en) * | 2010-12-07 | 2011-04-27 | 中国科学院软件研究所 | Method and system for hierarchically connecting trusted networks |
CN103581203A (en) * | 2013-11-20 | 2014-02-12 | 北京可信华泰信息技术有限公司 | Trusted network connection method based on trusted computing |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111917760A (en) * | 2020-07-28 | 2020-11-10 | 国家工业信息安全发展研究中心 | Network collaborative manufacturing cross-domain fusion trust management and control method based on identification analysis |
CN112445537A (en) * | 2020-12-11 | 2021-03-05 | 中国科学院信息工程研究所 | Trusted starting method and device of operating system, mobile terminal and storage medium |
CN113794685A (en) * | 2021-08-16 | 2021-12-14 | 可信计算科技(无锡)有限公司 | Data transmission method and device based on credible evaluation |
CN113794685B (en) * | 2021-08-16 | 2023-09-29 | 德威可信(北京)科技有限公司 | Data transmission method and device based on credibility assessment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107911373B (en) | A kind of block chain right management method and system | |
CN105246073B (en) | The access authentication method and server of wireless network | |
CN108416589A (en) | Connection method, system and the computer readable storage medium of block chain node | |
CN111010376A (en) | Master-slave chain-based Internet of things authentication system and method | |
CN109413107A (en) | A kind of credible platform connection method | |
KR20170041657A (en) | System and method for carrying strong authentication events over different channels | |
WO2008122108A1 (en) | Redundant multifactor authentication in an identity management system | |
US10803154B2 (en) | Multicomputer system for user data authentication and processing | |
CN105991596B (en) | Access control method and system | |
CN109446788A (en) | A kind of identity identifying method and device, computer storage medium of equipment | |
CN110138747B (en) | Method and system for verifying login state of account | |
CN105392137A (en) | Household WIFI embezzlement preventing method, wireless router and terminal equipment | |
CN106899561A (en) | A kind of TNC authority control methods and system based on ACL | |
CN112491829A (en) | MEC platform identity authentication method and device based on 5G core network and block chain | |
CN112950201A (en) | Node management method and related device applied to block chain system | |
CN109862006A (en) | A kind of block catenary system cut-in method, apparatus and system | |
CN103051598B (en) | Method, user equipment and packet access gateway for secure access to Internet services | |
WO2016048129A2 (en) | A system and method for authenticating a user based on user behaviour and environmental factors | |
CN102972005B (en) | Pay authentication method | |
CN106162718A (en) | A kind of WiFi network access detection method and device | |
CN109768967A (en) | A kind of credible platform connection system | |
CN106302479B (en) | A kind of single-point logging method and system for multi-service internet site | |
JP6674443B2 (en) | Method and apparatus for using exhaustible network resources | |
KR101160219B1 (en) | Tracking system and method of connecting route for the network security | |
CN105813006B (en) | A kind of information upgrade method, terminal device, network management device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190301 |