CN109413107A - A kind of credible platform connection method - Google Patents

A kind of credible platform connection method Download PDF

Info

Publication number
CN109413107A
CN109413107A CN201811548214.7A CN201811548214A CN109413107A CN 109413107 A CN109413107 A CN 109413107A CN 201811548214 A CN201811548214 A CN 201811548214A CN 109413107 A CN109413107 A CN 109413107A
Authority
CN
China
Prior art keywords
platform
user
gateway
access
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811548214.7A
Other languages
Chinese (zh)
Inventor
孙瑜
洪宇
王大海
夏攀
王涛
王强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING HUATECH TRUSTED COMPUTING INFORMATION TECHNOLOGY Co Ltd
Original Assignee
BEIJING HUATECH TRUSTED COMPUTING INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING HUATECH TRUSTED COMPUTING INFORMATION TECHNOLOGY Co Ltd filed Critical BEIJING HUATECH TRUSTED COMPUTING INFORMATION TECHNOLOGY Co Ltd
Priority to CN201811548214.7A priority Critical patent/CN109413107A/en
Publication of CN109413107A publication Critical patent/CN109413107A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of credible platform connection methods, identify including user identity identification, platform security and according to identification result control network connection, using credible network connecting construction, in conjunction with user behavior analysis, realize that the user identity that network is accessed under Windows environment identifies, bi-directional platform identifies and completeness of platform identifies, Windows server is enabled to carry out authentic authentication to the behavior of access terminal, decide whether to allow the network request of safety to access according to identification result, to realize believable network connection.

Description

A kind of credible platform connection method
Technical field
The present invention relates to computer safety fields, and in particular to a kind of credible platform connection method.
Background technique
Currently, in individual office desktop operating system field, although receiving the challenge of more and more novel products, It is that Windows system still occupies dominant position, occupation rate of market is up to 91.41%.The Mac OS X occupation rate of apple is then It is 6.32%, and Linux occupation rate only has 2.27%.
The favor of Global Subscriber is won at Windows system interface intuitive with its, succinct, generous, but Windows system There is also some problems, such as the opacity of Windows own system, and unknown loophole to be caused to be grown thickly for itself, outburst in May Extorting virus event is even more good illustration.In addition Windows is when being connected to the network, mainly using TNC connection framework by Framework is verified using unidirectional completeness of platform in TNC, not only the credibility two-way to connecting platform not can guarantee, but also to access The credibility of platform behavior not can guarantee.
Summary of the invention
For the above-mentioned problems in the prior art, for the present invention towards Windows environment, proposing corresponding network can Believe connection framework, guarantees the credible connection of Windows.
A kind of credible platform connection method characterized by comprising
Step S1, user identity identifies, wherein identifying by gateway to user identity, enters step if if identifying Otherwise rapid S2 forbids this attended operation;
Step S2, platform security identifies, and the content of identification includes the behavioural information of system and the integrality degree of platform Magnitude enters step S3 after the completion of identifying;
Step S3, it is controlled and is connected to the network according to identification result, if identification result is qualification, current network is allowed to connect, Otherwise refusal current network connection.
Preferably, the step S1 further include:
Step S11, connection prepares: before connection starts, Windows terminal and server incoming end passes through binding TPCM phase It closes interface and carries out integrality collection;
Step S12, user sends network insertion request to gateway;
Step S13, user and gateway carry out user identity identification: being negotiated based on trusted third party authentication center by code key Agreement establishes communication code key Key, and after communication code key is established, user encrypts relevant information U by code key, is sent to gateway, net It after closing decryption, compares, is identified with stored information, enter step S2 if if identifying, otherwise refuse the access Request.
Preferably, the step S2 further include:
Step S21, user sends platform identification request to Windows terminal, and gateway sends platform to server-side access point Identify request;
Step S22, after server-side access point receives platform identification request, it is flat that at least one wheel is executed with Third Party Authentication center Platform authentication protocol realizes that the platform between access requestor and access control person identifies;
Step S23, in platform discrimination process, Windows terminal and service terminate the IF-IMC interface that access point passes through platform Each IMC of standard and TPCM carry out information exchange, obtain the integrity information M of platform, trusted third party is connect by IF-IMC Mouth standard and the IMC of storage carry out information exchange and obtain standard value information M '.
Preferably, the integrity information M further include:
Hard disk information, memory information, operating system version, important patch, the network information, associated drives.
Preferably, after the step S23 further include:
Step S24, TPCM calls IF-AGC interface to be collected the behavior of system;
Step S25, the completeness check interface of storage calls in trusted third party, to the completeness of platform degree of user and gateway Magnitude is verified and is assessed, and trusted third party generates the completeness of platform assessment result of user and gateway according to assessment strategy, Windows terminal and service termination access point are sent by completeness of platform result.
Preferably, the behavior further include:
Under the current running environment of computer, whether application operating meets rule, with the presence or absence of unauthorized access, operation sequence Arrange at least one of whether legal, network request situation.
Preferably, the platform integrity metric value to user and gateway verifies and assessment includes:
Whether integrity information M and M ' the standard value information for verifying the platform is identical.
Preferably, the step S3 further include:
The assessment result that step 31, Windows terminal and service termination access point are generated according to trusted third party respectively generates Access decision is sent respectively to user and gateway;
Step 32, user and gateway execute access control according to the access decision of generation, and gateway is determined according to the access of generation Plan controls access of the user to protected network, and user decides whether to be connected to the shielded net according to the access decision of generation Network, to realize that Windows trustable network connects.
The present invention relates to a kind of credible platform connection methods, including user identity identifies, platform security identifies and root According to identification result control network connection, realized using credible network connecting construction in conjunction with user behavior analysis The user identity identification, bi-directional platform identification and completeness of platform that network is accessed under Windows environment identify, and Windows is enabled to take Device be engaged in the behavior progress authentic authentication of access terminal, decides whether to allow the network request of safety to access according to identification result, To realize believable network connection.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
Fig. 1 is a kind of architecture diagram of credible platform connection system in the embodiment of the present invention one;
Fig. 2 is a kind of flow chart of credible platform connection method in the embodiment of the present invention three.
Specific embodiment
Now in conjunction with attached drawing, elaborate to presently preferred embodiments of the present invention.
Embodiment one
The present embodiment proposes a kind of credible platform connection system, as shown in Figure 1, including access requestor, access control Device and trusted third party, wherein the access requestor and the access controller carry out two-way body by the trusted third party Part identifies and credible platform assessment, the system specifically include:
(1) access requestor
Access requestor function specifically includes that initiation network access request, realizes and reflects with the bidirectional identification of access controller Not;The integrality of Windows access terminal is collected, integrity measurement report is generated, is completed double with access controller It is assessed to completeness of platform;Meanwhile Windows application behavior is collected, corresponding measurement report is generated, tactful pipe is sent to Manage device.
Access requestor includes following functions module: Windows access requestor, Windows application behavior gatherer, TPCM, Windows terminal, user.
(2) access controller
Access controller major function includes realizing to identify with the bidirectional identification of access requestor, is realized to access requestor Credible evaluation, meanwhile, realize and the behavior of server-side access point collected;Receive the integrity measurement of Windows access terminal Value completes that these metrics are sent to authentic authentication center to the integrity measurement value of server-side access point.To access point row It is collected for integrality, sends tactical management center for measurement results.
Access controller mainly comprises the following modules: Windows access controller, access requestor, incoming end TPCM, clothes Business device incoming end, gateway.
(3) trusted third party
Trusted third party's major function is served as in bidirectional identification discrimination process in access requestor and access controller Trusted third party verifies both sides' certificate validity;Completeness of platform, the server of Windows access terminal are accessed The completeness of platform at end carries out verification assessment, forms measurement report, and carry out measurement to its behavior integrality and verify.
Trusted third party mainly comprises the following modules: Windows V&V of behavior person, integrity measurement verifier is credible to recognize Card center.
The functional component being related in the credible platform connection system is explained below:
(1) user
User is responsible for initiating network request, and completes to identify with the bidirectional identification of gateway under heart assist in authentic authentication, Access controller and trusted third party, and the visit issued according to identity identification result and upper layer are sent by upper layer protocol data packet Ask that control strategy realizes access control.
(2) gateway
Gateway receives Client-initiated network request, and is realized by trusted third party and identified with the bidirectional identification of user, Trusted third party is sent by upper layer protocol data packet, the access control policy issued according to identity identification result and upper layer is realized To the access control of user network request.
(3) authentic authentication center
Identify in the bidirectional identification of user and gateway and serves as trusted third party in credible platform evaluation process.
(4) Windows terminal
Integrity information is requested and collected to assessment layer, realizes that credible platform integrality is commented in the case where authentic authentication center helps Estimate.
(5) server-side access point
Integrity information is requested and collected to the integrity information for receiving Windows terminal to assessment layer, in authentic authentication The heart helps the lower credible platform integrity assessment realized with Windows terminal.The integrity assessment plan that trusted third party is generated Slightly it is sent to gateway.
(6)TPCM
It realizes that the integrality of terminal and incoming end is collected, generates corresponding integrity report.Interface is collected in calling behavior, right The behavior integrality of Windows application is collected.
(7) completeness check person
Verification assessment is carried out to the integrality of the Windows terminal and service termination access point that receive.
(8) Windows application behavior gatherer
Collect the behavior integrality of Windows terminal applies.
(9) Windows application behavior requestor
Collect the behavior integrality of server-side access point.
(10) Windows application V&V of behavior person
The behavior integrality of behavior integrality and access point to terminal carries out verification assessment.
The present embodiment proposes a kind of credible platform connection system towards Windows environment, is connected using trustable network Framework, in conjunction with user behavior analysis, realize that the user identity that network is accessed under Windows environment identifies, bi-directional platform identifies and Completeness of platform identifies, and decides whether to allow the network request of safety to access according to identification result, to realize believable network Connection.
Embodiment two
System is connected based on a kind of credible platform proposed in embodiment one, the present embodiment is to its software system architecture level It is illustrated, the system comprises NS software layer, credible platforms to assess layer, integrity measurement layer and behavior collecting layer, Above system framework layer specifically includes:
(1) NS software layer
The function of NS software layer realizes Windows access request with the help of being mainly included in authentic authentication center The bidirectional identification of person and Windows access controller identifies, and realizes access control according to the assessment strategy of identification result and assessment layer System.
(2) credible platform assesses layer
Credible platform assessment layer mainly realizes the completeness of platform assessment school of Windows access terminal and service termination access point It tests.Serve as trusted third party in authentic authentication center.Windows terminal and service termination access point call the relevant interface of measurement layer, Completeness of platform information is obtained, authentic authentication center is sent to, the integrality in completeness check layer is called at authentic authentication center Verifier interface verifies the integrality of terminal and access point.
(3) integrity measurement layer
Integrity measurement layer mainly realizes that the completeness of platform to Windows access terminal and service termination access point is received Collection, and generate corresponding integrity report.Integrality collects the completeness check person for completing to be sent to trusted third party and carries out school It tests.
(4) behavior collecting layer
The collection of window networking behavior is realized in behavior collecting layer, and the platform of terminal and incoming end is pacified when to network insertion Full behavior is collected, relevant safety behavior include using whether meet rule, with the presence or absence of the unauthorized access of application, to behaviour It is whether correct etc. to make sequence.
Embodiment three
Based on system software architecture in the credible platform connection system and embodiment two in embodiment one, the present embodiment is proposed A kind of credible platform connection method, as shown in Fig. 2, including that user identity identifies, platform security identifies and according to identification As a result three big steps of control network connection, the detailed process of the method are as follows:
1) connection prepares: before connection starts, Windows terminal and server incoming end passes through binding TPCM relevant interface Carry out integrality collection;
2) user sends network insertion request to gateway;
3) user and gateway carry out user identity identification.Pass through code key agreement protocol based on trusted third party authentication center, Communication code key Key is established, after communication code key is established, user encrypts relevant information U (id, password) by code key, sends It compares, is identified with stored information after gateway decryption to gateway, enter step 4) if if identifying, otherwise refuse The access request;
4) user sends platform identification request to Windows terminal, and gateway sends platform identification to server-side access point and asks It asks;
5) after server-side access point receives platform identification request, a wheel is executed with Third Party Authentication center or takes turns platform mirror more Other agreement realizes that the platform between access requestor and access control person identifies;
6) in platform discrimination process, Windows terminal and service termination access point pass through each of the IF-IMC and TPCM of platform A IMC carries out information exchange, obtains integrity information M (hard disk information, memory information, operating system version, the important benefit of platform Fourth, the network information, associated drives etc.), trusted third party carries out information exchange by IF-IMC and the IMC of storage and obtains standard value Information M ';
7) in platform discrimination process, other than platform essential information, it is also necessary to the multidate information of collection system, i.e. behavior letter Breath.TPCM calls IF-AGC interface to be collected behavior, and behavior includes the current running environment of computer, such as application operating Whether rule is met, with the presence or absence of unauthorized access, whether legal, the network request situation of the sequence of operation etc.;
8) in platform discrimination process, the completeness check interface of storage calls in trusted third party, to user and gateway Platform integrity metric value is verified and is assessed (i.e. verifying M==M '), and trusted third party generates user according to assessment strategy With the completeness of platform assessment result of gateway, Windows terminal and service termination access point are sent by completeness of platform result;
9) assessment result that Windows terminal and service termination access point are generated according to trusted third party respectively generates access and determines Plan is sent respectively to user and gateway;
10) user and gateway execute access control according to the access decision of generation, and gateway is according to the access decision control of generation System (the allow, refusal) access of user to protected network, user according to the access decision of generation decide whether to be connected to this by The network of protection, to realize that Windows trustable network connects.
The invention proposes a kind of credible platforms to connect system and method, using credible network connecting construction, in conjunction with user Behavioural analysis realizes that the user identity that network is accessed under Windows environment identifies, bi-directional platform identifies and completeness of platform mirror Not, it enables Windows server carry out authentic authentication to the behavior of access terminal, is decided whether to allow safety according to identification result Network request access, to realize believable network connection.
In several embodiments provided by the present invention, it should be understood that disclosed method and terminal can pass through it Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the module, only Only a kind of logical function partition, there may be another division manner in actual implementation.
In addition, the technical solution in above-mentioned several embodiments can be combined with each other and replace in the case where not conflicting It changes.
The module as illustrated by the separation member may or may not be physically separated, aobvious as module The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.Some or all of the modules therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
It, can also be in addition, each functional module in each embodiment of the present invention can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of hardware adds software function module.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie In the case where without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims Variation is included in the present invention.Any attached associated diagram label in claim should not be considered as right involved in limitation to want It asks.Furthermore, it is to be understood that one word of " comprising " does not exclude other units or steps, odd number is not excluded for plural number.It is stated in system claims Multiple modules or device can also be implemented through software or hardware by a module or device.The first, the second equal words It is used to indicate names, and does not indicate any particular order.
Finally it should be noted that the above examples are only used to illustrate the technical scheme of the present invention and are not limiting, although reference Preferred embodiment describes the invention in detail, those skilled in the art should understand that, it can be to of the invention Technical solution is modified or equivalent replacement, without departing from the spirit and scope of the technical solution of the present invention.

Claims (8)

1. a kind of credible platform connection method characterized by comprising
Step S1, user identity identifies, wherein being identified by gateway to user identity, enters step if if identifying Otherwise S2 forbids this attended operation;
Step S2, platform security identifies, and the content of identification includes the behavioural information of system and the integrity measurement value of platform, S3 is entered step after the completion of identifying;
Step S3, it is controlled and is connected to the network according to identification result, if identification result is qualification, allow current network to connect, otherwise Refuse current network connection.
2. a kind of credible platform connection method according to claim 1, which is characterized in that the step S1 further include:
Step S11, connection prepares: before connection starts, Windows terminal and server incoming end is connect by binding TPCM correlation Mouth carries out integrality collection;
Step S12, user sends network insertion request to gateway;
Step S13, user and gateway carry out user identity identification: negotiating to assist by code key based on trusted third party authentication center View establishes communication code key Key, and after communication code key is established, user encrypts relevant information U by code key, is sent to gateway, gateway It after decryption, compares, is identified with stored information, enter step S2 if if identifying, otherwise refuse the access and ask It asks.
3. a kind of credible platform connection method according to claim 1, which is characterized in that the step S2 further include:
Step S21, user sends platform identification request to Windows terminal, and gateway sends platform to server-side access point and identifies Request;
Step S22, after server-side access point receives platform identification request, at least one wheel platform mirror is executed with Third Party Authentication center Other agreement realizes that the platform between access requestor and access control person identifies;
Step S23, in platform discrimination process, Windows terminal and service terminate the IF-IMC interface standard that access point passes through platform Information exchange is carried out with each IMC of TPCM, obtains the integrity information M of platform, trusted third party passes through IF-IMC interface mark The quasi- IMC with storage carries out information exchange and obtains standard value information M '.
4. a kind of credible platform connection method according to claim 3, which is characterized in that the integrity information M is also Include:
Hard disk information, memory information, operating system version, important patch, the network information, associated drives.
5. a kind of credible platform connection method according to claim 3, which is characterized in that also wrapped after the step S23 It includes:
Step S24, TPCM calls IF-AGC interface to be collected the behavior of system;
Step S25, the completeness check interface of storage calls in trusted third party, to the platform integrity metric value of user and gateway It is verified and is assessed, trusted third party generates the completeness of platform assessment result of user and gateway according to assessment strategy, will put down Platform integrity result is sent to Windows terminal and service termination access point.
6. a kind of credible platform connection method according to claim 5, which is characterized in that the behavior further include:
Under the current running environment of computer, whether application operating meets rule, is with the presence or absence of unauthorized access, the sequence of operation At least one of no legal, network request situation.
7. a kind of credible platform connection method according to claim 5, which is characterized in that described to be put down to user and gateway Platform integrity measurement value carries out verification and assessment includes:
Whether integrity information M and M ' the standard value information for verifying the platform is identical.
8. a kind of credible platform connection method according to claim 1, which is characterized in that the step S3 further include:
The assessment result that step 31, Windows terminal and service termination access point are generated according to trusted third party respectively generates access Decision is sent respectively to user and gateway;
Step 32, user and gateway execute access control according to the access decision of generation, and gateway is according to the access decision control of generation Access of the user processed to protected network, user decide whether to be connected to the shielded network according to the access decision of generation, To realize that Windows trustable network connects.
CN201811548214.7A 2018-12-18 2018-12-18 A kind of credible platform connection method Pending CN109413107A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811548214.7A CN109413107A (en) 2018-12-18 2018-12-18 A kind of credible platform connection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811548214.7A CN109413107A (en) 2018-12-18 2018-12-18 A kind of credible platform connection method

Publications (1)

Publication Number Publication Date
CN109413107A true CN109413107A (en) 2019-03-01

Family

ID=65460919

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811548214.7A Pending CN109413107A (en) 2018-12-18 2018-12-18 A kind of credible platform connection method

Country Status (1)

Country Link
CN (1) CN109413107A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111917760A (en) * 2020-07-28 2020-11-10 国家工业信息安全发展研究中心 Network collaborative manufacturing cross-domain fusion trust management and control method based on identification analysis
CN112445537A (en) * 2020-12-11 2021-03-05 中国科学院信息工程研究所 Trusted starting method and device of operating system, mobile terminal and storage medium
CN113794685A (en) * 2021-08-16 2021-12-14 可信计算科技(无锡)有限公司 Data transmission method and device based on credible evaluation

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101136928A (en) * 2007-10-19 2008-03-05 北京工业大学 Reliable network access framework
KR20080050214A (en) * 2006-12-01 2008-06-05 한국전자통신연구원 Network authentication apparatus and method using integrity information of platform
CN101350721A (en) * 2007-07-20 2009-01-21 华为技术有限公司 Network system, network access method and network appliance
CN102035837A (en) * 2010-12-07 2011-04-27 中国科学院软件研究所 Method and system for hierarchically connecting trusted networks
CN103581203A (en) * 2013-11-20 2014-02-12 北京可信华泰信息技术有限公司 Trusted network connection method based on trusted computing

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20080050214A (en) * 2006-12-01 2008-06-05 한국전자통신연구원 Network authentication apparatus and method using integrity information of platform
CN101350721A (en) * 2007-07-20 2009-01-21 华为技术有限公司 Network system, network access method and network appliance
CN101136928A (en) * 2007-10-19 2008-03-05 北京工业大学 Reliable network access framework
CN102035837A (en) * 2010-12-07 2011-04-27 中国科学院软件研究所 Method and system for hierarchically connecting trusted networks
CN103581203A (en) * 2013-11-20 2014-02-12 北京可信华泰信息技术有限公司 Trusted network connection method based on trusted computing

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111917760A (en) * 2020-07-28 2020-11-10 国家工业信息安全发展研究中心 Network collaborative manufacturing cross-domain fusion trust management and control method based on identification analysis
CN112445537A (en) * 2020-12-11 2021-03-05 中国科学院信息工程研究所 Trusted starting method and device of operating system, mobile terminal and storage medium
CN113794685A (en) * 2021-08-16 2021-12-14 可信计算科技(无锡)有限公司 Data transmission method and device based on credible evaluation
CN113794685B (en) * 2021-08-16 2023-09-29 德威可信(北京)科技有限公司 Data transmission method and device based on credibility assessment

Similar Documents

Publication Publication Date Title
CN107911373B (en) A kind of block chain right management method and system
CN105246073B (en) The access authentication method and server of wireless network
CN108416589A (en) Connection method, system and the computer readable storage medium of block chain node
CN111010376A (en) Master-slave chain-based Internet of things authentication system and method
CN109413107A (en) A kind of credible platform connection method
KR20170041657A (en) System and method for carrying strong authentication events over different channels
WO2008122108A1 (en) Redundant multifactor authentication in an identity management system
US10803154B2 (en) Multicomputer system for user data authentication and processing
CN105991596B (en) Access control method and system
CN109446788A (en) A kind of identity identifying method and device, computer storage medium of equipment
CN110138747B (en) Method and system for verifying login state of account
CN105392137A (en) Household WIFI embezzlement preventing method, wireless router and terminal equipment
CN106899561A (en) A kind of TNC authority control methods and system based on ACL
CN112491829A (en) MEC platform identity authentication method and device based on 5G core network and block chain
CN112950201A (en) Node management method and related device applied to block chain system
CN109862006A (en) A kind of block catenary system cut-in method, apparatus and system
CN103051598B (en) Method, user equipment and packet access gateway for secure access to Internet services
WO2016048129A2 (en) A system and method for authenticating a user based on user behaviour and environmental factors
CN102972005B (en) Pay authentication method
CN106162718A (en) A kind of WiFi network access detection method and device
CN109768967A (en) A kind of credible platform connection system
CN106302479B (en) A kind of single-point logging method and system for multi-service internet site
JP6674443B2 (en) Method and apparatus for using exhaustible network resources
KR101160219B1 (en) Tracking system and method of connecting route for the network security
CN105813006B (en) A kind of information upgrade method, terminal device, network management device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190301