WO2009115029A1 - 一种修复数据的方法、系统和装置 - Google Patents

一种修复数据的方法、系统和装置 Download PDF

Info

Publication number
WO2009115029A1
WO2009115029A1 PCT/CN2009/070815 CN2009070815W WO2009115029A1 WO 2009115029 A1 WO2009115029 A1 WO 2009115029A1 CN 2009070815 W CN2009070815 W CN 2009070815W WO 2009115029 A1 WO2009115029 A1 WO 2009115029A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
server
repair
resource
verification
Prior art date
Application number
PCT/CN2009/070815
Other languages
English (en)
French (fr)
Inventor
刘衍珩
王健
余雪岗
朱建启
吴静
丁一兰
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2009115029A1 publication Critical patent/WO2009115029A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2129Authenticate client device independently of the user

Definitions

  • the present invention relates to the field of communications, and in particular, to a method, system and apparatus for repairing data. Background technique
  • the Internet has been widely used since its appearance, and people are increasingly dependent on it.
  • the trustworthiness of the network is greatly reduced. For example: Managed or unmanaged end users attempting to access certain networks, although network providers can use existing standard technologies to limit access to the network, but many malicious attacks from within the network are still at a loss. To solve internal security threats, you need to establish a trust delivery model for information. The core of information security is shifting to "trustworthiness.”
  • a trusted Internet should have the following characteristics:
  • Controllability refers to the ability to control violations of network security policies.
  • TCG Leading Compaq
  • TPM CTrusted Platform Module
  • TCG TCG released the TNC (Trusted Network Connect) specification. Its main purpose is to realize the collaborative work of network access control by using the terminal technology provided by the trusted host. See Figure 1 for a schematic diagram of the TNC architecture provided for TNG. Among them, the trusted network connection technology TNC is built on the host-based trusted computing technology.
  • a solution based on the TNC open specification ensures that the terminal device attempting to access the network meets the source, integrity status and security requirements and other security policies specified by the network operator, among which;
  • An Access Requestor is an entity requesting access to a protected network (possibly one or more physical computers or a separate program residing on the computer). Among them, the AR has three modules according to functions:
  • the Network Access Requestor is used to initiate a network request.
  • the Trusted Client Module (TNCC) is mainly responsible for collecting trusted information and sending the information to the trusted service module (TNCS, TNC Server) performs trusted authentication;
  • the Integrity Measurement Collector (IMC) is responsible for measuring trusted information related to the integrity of the AR entity, such as operating system security, anti-virus software, firewall, application software version, etc. There may be one or more trusted information measurement modules in the entity;
  • PEP Policy Enforcement Point
  • PDP Policy Decision Point
  • the Network Access Authority is used to determine whether the AR should obtain access authorization, and ask the trusted server whether the integrity of the AR meets the local security policy.
  • the Trusted Server Module is used to manage the trusted Message flow between the Information Verification Module (IMV) and the Trusted Information Measurement Module (IMC), comparing the verification results with local security policies to make the final global assessment results, such as verification success, failure or recommendation Repair, etc.;
  • the Trusted Information Verification Module (IMV) is used to verify the trusted information transmitted from the trusted information measurement module. There may be multiple trusted information verification modules in a PDP.
  • a terminal integrity verification fails and needs to enter the trusted repair process, if the trusted network access process lacks a repair link, then the access user who does not meet the trusted network integrity requirements will not be able to know that it is due to For what reason, you cannot access a trusted network, or you cannot obtain repair data through a secure and trusted channel. Users can only download the repairable resources manually. This is a rather cumbersome and complicated process for users, which will affect the user's enthusiasm for the use of trusted networks and negatively affect the popularity of trusted networks.
  • an embodiment of the present invention provides a method for repairing data, where the method includes:
  • the repair server receives the verification message sent by the terminal, and the verification message carries the identity information of the terminal, and verifies the legality of the terminal according to the pre-stored terminal identity information;
  • the resource request message sent by the terminal is received, and it is determined whether the resource required by the terminal can be provided. If yes, the resource is sent to the terminal, and the resource is used by the terminal. The data of the terminal itself is repaired.
  • an embodiment of the present invention provides a system for repairing data, where the system includes: a terminal and a repair server, where
  • the terminal is configured to send a verification message to the repair server; after the identity verification is passed, send a resource request message to the repair server, receive a resource sent by the repair server, and repair its own data according to the resource;
  • the repair server is configured to receive the verification message sent by the terminal, verify the validity of the terminal according to the pre-stored terminal identity information, and receive a resource request message sent by the terminal, to determine whether the terminal can be provided. The required resource, if yes, delivers the resource to the terminal.
  • an embodiment of the present invention provides a terminal device, where the terminal device includes:
  • a sending module configured to send a verification message and resource request information to the repair server
  • a receiving module configured to receive, by the repair server, the resource that is acquired by the repair server after verifying that the repair server can provide the resource, and the resource is obtained and sent by the repair server according to the verification information;
  • a repairing module configured to repair data of itself according to the resource received by the receiving module.
  • an embodiment of the present invention provides a repair server, where the repair server includes:
  • a receiving module configured to receive a verification message sent by the terminal
  • a verification module configured to verify validity of the terminal according to the terminal identity information stored by the terminal and the verification message of the terminal received by the receiving module;
  • a processing module configured to: when the verification result of the verification module is valid, receive a resource request message sent by the terminal, determine whether the resource required by the terminal can be provided, and if yes, send the resource to the terminal.
  • an embodiment of the present invention provides a decision server, where the decision server includes:
  • a verification module configured to perform integrity verification on the terminal
  • a sending module configured to send an access failure message to the terminal after the verification module fails to perform integrity verification on the terminal, and send the verification information of the terminal acquired in the process of verifying the integrity of the terminal to the repair server, where
  • the verification information of the terminal includes the terminal identifier and resource information required by the terminal.
  • FIG. 1 is a schematic diagram of a network architecture of a trusted network provided by the prior art
  • Embodiment 1 of the present invention is a schematic diagram of a trusted repair communication scenario provided by Embodiment 1 of the present invention
  • Embodiment 3 is a flowchart of a method for repairing data provided by Embodiment 1 of the present invention.
  • FIG. 4 is a schematic structural diagram of a function of a terminal TRA according to Embodiment 1 of the present invention.
  • FIG. 5 is a schematic diagram showing the functional structure of an MTRS according to Embodiment 1 of the present invention.
  • FIG. 6 is a schematic diagram showing the functional structure of a TRRS according to Embodiment 1 of the present invention.
  • FIG. 7 is a schematic diagram of a network architecture of a trusted repair network according to Embodiment 1 of the present invention.
  • Embodiment 8 is a schematic diagram of a system for repairing data provided by Embodiment 2 of the present invention.
  • FIG. 9 is a schematic diagram of a repair server according to Embodiment 4 of the present invention.
  • Figure 10 is a schematic diagram of a terminal device according to Embodiment 3 of the present invention.
  • FIG 11 is a schematic diagram of a decision server provided in Embodiment 5 of the present invention. detailed description
  • the technical solution provided by the embodiment of the present invention by adding a trusted repair server and a Trusted Remediation Application (TRA) on the basis of the existing TNC architecture, realizes that when accessing the trusted network
  • the user terminal that cannot access the trusted network due to the failure of the integrity verification fails to provide the automatic repairable process, so that the user terminal can successfully implement the access of the trusted network after the repair process is automatically completed.
  • the embodiment of the invention provides a method for repairing data, and the method is as follows:
  • the repair server receives the verification message sent by the terminal, and the verification message carries the identity information of the terminal, and verifies the legality of the terminal according to the terminal identity information stored by the terminal;
  • the resource request message sent by the terminal is received, and it is determined whether the resource required by the terminal can be provided. If yes, the resource is sent to the terminal.
  • the terminal receives the resources sent by the repair server and repairs its own data according to the resources.
  • the repair server may be specifically designed to include: a primary repair server and at least one repair resource server, and correspondingly, the method is specifically:
  • the primary repair server receives the verification message sent by the terminal, and the verification message carries the identity information of the terminal, and verifies the legal component of the terminal according to the pre-stored terminal identity information;
  • the primary repair server After verifying the validity of the terminal, the primary repair server receives the resource request message sent by the terminal, and determines whether the repair resource server can provide the resource required by the terminal. If yes, the resource is obtained from the repair resource server, and the resource is forwarded to the terminal.
  • the terminal receives the resources sent by the repair server and repairs its own data according to the resources.
  • the step of acquiring the resource to the repair resource server and forwarding the resource to the terminal may be specifically implemented by:
  • the primary repair server sends a resource acquisition message to the repair resource server, and the repair resource server determines whether the resource can be provided. If yes, the resource is sent to the primary repair server, and the primary repair server forwards the resource to the terminal.
  • the method further includes:
  • the decision server sends an access failure message to the terminal, and sends the verification message of the terminal to the repair server.
  • the verification message of the terminal includes the terminal identifier and resource information required by the terminal.
  • the decision server sends a trusted network access failure message to the terminal, and sends the identity information of the terminal to the repair server, where the identity message of the terminal includes the terminal identifier;
  • the resource request message sent by the terminal carries the resource information required by the terminal.
  • the method may further include: the decision server and the repair server perform identity verification, for example: the decision server sends an identity verification message to the repair server, and the identity verification message carries the identifier of the decision server, and the repair server receives the identifier.
  • the decision server is authenticated according to the identity of the decision server; after the repair server passes the verification of the decision server, the repair server sends an identity verification message to the decision server, where the identity verification message carries the identifier of the repair server, and the decision server receives To the authentication message, authenticate the repair server based on the identity of the repair server. After the two-way authentication is passed, the steps provided by the above method are performed.
  • an execution server for isolating the terminal and the trusted repair network exists between the terminal and the repair server, and the execution server is specific.
  • the function is as follows:
  • the repair server receives the verification message sent by the terminal forwarded by the execution server, and verifies the legality of the terminal according to the pre-stored terminal identity information; After the verification of the validity of the terminal is successful, the resource request message sent by the server is forwarded by the execution server to determine whether the resource required by the terminal can be provided. If yes, the server sends the resource to the terminal through the execution server.
  • the terminal receives the resource sent by the repair server forwarded by the execution server, and repairs its own data according to the resource.
  • the method provided by the embodiment of the present invention implements the acquisition of data for repair, ensures the security and concealment of the repair server for providing repair data, and ensures the network of the trusted repair network.
  • Security, balancing the load of the trusted repair resource server, and designing the trusted repair resource server specifically includes: a main repaired server (MTRS) and a plurality of repaired resource servers (TRRS, Trusted Remediation Resource Server). Different TRRSs are provided and maintained by different vendors.
  • MTRS main repaired server
  • TRRS Trusted Remediation Resource Server
  • Embodiment 1 the method for repairing data provided by the embodiment of the present invention will be described in detail below with reference to a plurality of embodiments.
  • the method for applying the repair data provided by the embodiment of the present invention is applied to a trusted network as an example.
  • the trusted information needs to be repaired, and the data for repair is automatically obtained. Therefore, the trusted data of the incompleteness is repaired by using the obtained repair resource, and the details are as follows: Embodiment 1
  • the trusted repair server includes a primary repair server MTRS and multiple repair resource servers TRRS; wherein TRS and TRRS are set in an environment isolated from the user, called a trusted repair network, a trusted repair network. Repair service capabilities can be provided for multiple PDPs.
  • the MTRS authenticates the terminal and the PDP, and directs to each TRRS according to the type of trusted attribute to be repaired (such as operating system security, anti-virus software, firewall, application software version, etc.), and the TRRS is provided by different vendors. Provide users with different types or vendors of repair resources.
  • the Trusted Repair Module (TRA) is a new module added to the access terminal to interact with the user.
  • an embodiment of the present invention provides a method for repairing data, where the method content is as follows:
  • the PDP sends an integrity verification failure message to the terminal after the integrity verification of the access terminal fails.
  • the terminal needs to perform the existing trusted data. Repair to get complete trusted information, the terminal enters the trusted repair process, the steps are as follows:
  • the terminal receives the verification failure message sent by the PDP, sends a pending terminal identity verification message to the MTRS, and requests to view the repairing action.
  • the specific implementation is as follows:
  • the terminal After receiving the verification failure message sent by the PDP, the terminal displays the repair information and measures to the user, and asks the user whether to perform the trusted repair. If the user does not perform the trusted repair, the terminal ends; if the user determines to perform the trusted repair, the terminal Sending an identity verification message of the terminal to the MTRS, where the identity verification message carries the identifier of the terminal and an encryption algorithm (such as MD5, etc.); 102: The MTRS receives the identity verification message sent by the terminal, performs identity verification on the terminal according to the terminal identifier carried in the terminal, and determines whether the terminal is legal; if yes, executes 103; otherwise, executes 109;
  • the PDP In the process of accessing the trusted network, when the PDP verifies that the integrity verification of an access terminal fails, the PDP sends a complete verification failure message to the terminal, where the verification failure message and the access failure message are Consistent, that is, the verification integrity failure is equal to the failure of the terminal to access the trusted network.
  • the PDP also sends a message carrying the information of the to-be-accessed terminal to the MTRS, where the message carries the to-be-accessed terminal identifier and the encryption algorithm (wherein the encryption algorithm is mainly used for protocol layer-based authentication) and the terminal
  • the required repair information is used in this embodiment to improve the speed at which the terminal obtains the repair resource, and the method for transmitting the repair information required by the PDP to the MTRS is used as an example.
  • the MTRS will carry the terminal to be accessed. Information messages are saved, such as in their own identity information base.
  • the MTRS queries the identity information database of the MTRS according to the terminal identifier carried in the terminal, and determines the legality of the terminal by checking whether the identity information of the terminal exists. The terminal is legal. Otherwise, the terminal is an illegal user and refuses to provide trusted repair service.
  • the terminal After the MTRS authentication user is legal, the terminal returns a message that the identity authentication succeeds.
  • the terminal After receiving the message that the identity authentication succeeds, the terminal sends a trusted repair resource request message to the MTRS.
  • the MTRS receives the trusted repair resource request message sent by the terminal, and determines whether it can be directed to the corresponding TRRS according to the item information that the terminal needs to repair, and if yes, executes 106; otherwise, executes 110.
  • MTRS itself manages multiple TRRSs, and different TRRSs can provide different trusted repair project resources.
  • the project that Terminal A needs to repair is the version number of Kingsoft anti-virus software. If there is a project resource TRRS that can provide version upgrade of Kingsoft anti-virus software, it indicates that MTRS can be directed to the corresponding TRRS.
  • the MTRS is directed to the TRRS, it can be implemented by the project resource identifier. See Table 1, which provides a schematic table for implementing the orientation.
  • an MTRS is provided to implement the TRRS orientation, which is indexed by the project identifier and directed to the corresponding TRRS.
  • the MTRS sends a repair resource indication to the directed TRRS, and the TRRS queries the host to obtain the corresponding trusted repair resource according to the indication of the MTRS, and returns the corresponding trusted repair resource to the MTRS.
  • the TRRS fails to obtain the corresponding trusted repair resource according to the indication of the MTRS, the TRRS returns a response message of the query failure to the MTRS.
  • the MTRS sends the obtained trusted repair resource to the terminal.
  • the terminal After obtaining the trusted repair resource, the terminal performs corresponding processing on the resource according to its own needs, such as installation, or overwriting, to complete the repair of the original incomplete data, and ends.
  • the terminal After the terminal completes the trusted repair process, the data is repaired, so that the trusted network can be re-accessed.
  • the MTRS notifies the terminal, refuses to provide trusted repair resources for the terminal, and ends.
  • the MTRS informs the terminal that the trusted repair resource cannot be provided, and cannot be repaired and ended.
  • the communication between the terminal and the MTRS may be performed through the redirection of the PEP, that is, the user may only redirect to the trusted repair network environment through the PEP, where the PEP is used.
  • the process of redirecting is as follows:
  • Filtering the EP table Contains at least three entries of the terminal IP address (AR_IP), the filter ID (FILTER ID), and the timeout period (EXPIRETIME). The role of the table is to determine the terminal to be repaired to be repaired according to the filtering rule. In the network. As shown in Table 2, where AR-ADDRESS indicates the IP address identifier of the terminal, FILTER_ID indicates whether the terminal needs to perform trusted repair access. For example, when the field of FILTER_ID is SUCCEED, it indicates that the terminal has successfully accessed. Trusted network; If the field of FILTER_ID is FIXJJP, it means that the terminal needs to be trusted repaired and so on.
  • Redirect the Redirect table at least the IP address of the terminal CAR_IP), the port used by the terminal for the repair process (AR PORT), and the port used by the PEP for the repair process (PEP_PORT).
  • the role of the table is to implement the repair. The function of redirection in the process. That is, when the field of FILTER_ID in Table 1 is FIXJJP, the Redirect table is enabled, see Table 3, which provides a schematic table of the Redirect table.
  • the PEP waits to receive the PDP to verify the integrity result information of a terminal, and records related information (terminal IP address, filter ID) into the filter table; the EP filter filters the incoming message according to the rules in the filter table. If the message is a PDP indicating that the terminal needs to be repaired, change the FILTER ID in the EP table to FIX UP; Then, when the terminal to be repaired accesses, the Redirect table records the IP address of the terminal and the port used for the repair process, and changes the destination IP address of the message to the IP address of the trusted repair server, and the source IP address is changed to PEP. IP address, the source port is changed to the unique port used by the PEP for the repair process; according to the destination IP address of the trusted repair server, the PEP forwards the message to the trusted repair server;
  • the IP address and the repair port of the terminal are found through the unique port used by the PEP for the repair process, and the destination IP address of the message is changed to the IP address of the terminal, and the destination port is changed to the AR port. Repair the port. According to the IP address of the terminal, the PEP forwards the response message to the terminal.
  • this process implements the redirection function of PEP, hides the repair server from the client, and improves the security of the trusted repair process.
  • the records corresponding to the terminal in the filtering table and the redirection table are deleted, and the terminal can perform re-access authentication of the trusted network.
  • the PEP redirection function is implemented, and the trusted repair network is hidden from the terminal as the client, which improves the security of the trusted repair process.
  • the MTRS needs to authenticate the PDP (authentication can be initiated when the PDP is started or after the terminal integrity verification fails), etc. ). Only after the identity verification succeeds, the MTRS can communicate with the PDP and the terminal to be repaired (for example, the MTRS receives the repair terminal information and the information to be repaired by the PDP, etc.), wherein the same trusted repair network can be multiple PDP provides repair services.
  • Two-way authentication of the decision server and the repair server can be achieved as follows:
  • the decision server sends an authentication message to the repair server.
  • the authentication message carries the identifier of the decision server.
  • the repair server authenticates the decision server according to the identifier of the decision server.
  • the repair server passes the verification of the decision server.
  • the repair server sends an authentication message to the decision server.
  • the authentication message carries the identifier of the repair server, and the decision server receives the identity verification message, and authenticates the repair server according to the identifier of the repair server.
  • the foregoing embodiment of the present invention performs the authentication of the MTRS and the PDP at the startup of the PDP as an example, that is, the PDPs mentioned in the foregoing 101-110 have been authenticated by the MTRS.
  • the trusted repair server and the trusted repair module TRA based on the existing TNC architecture, it is possible to access the trusted network, and the access cannot be trusted due to the integrity verification failure.
  • the user terminal of the network by providing an automatic repairable process, enables the user terminal to automatically complete the repair process and successfully implement the access of the trusted network.
  • each terminal includes a trusted repair client module, which is called a trusted repair application. (TRA). Its function is mainly used to receive and parse the trusted attribute information that needs to be repaired, display the repair measures and suggestions to the user, receive and process the trusted repair resources (installation, coverage, etc.), and complete the trusted repair.
  • TRA trusted repair application.
  • the IMC interface module processes the data interaction between the TRA and the IMC: includes receiving data transmitted by the IMC interface module to the TRA, and sending the error information to the error information parsing module.
  • the error information parsing module receives the integrity attribute information of a verification failure, and parses the information.
  • NAR interface module Processes the data interaction between TRA and NAR. The method includes receiving and transmitting a request and response message sent by the NAR module to the TRA, and transmitting the corresponding message to the MTRS so that the client can connect to the MTRS for trusted repair.
  • Process Processing Module Receive trusted repair resources and complete the repair process such as installation coverage. Referring to Table 4, a schematic table of the TRA interacting with other communication objects is provided.
  • the trusted repair server is in a user-isolated environment, also known as a trusted repair network.
  • a trusted repair network To ensure the security of the trusted repair network, the load of the trusted repair resource server can be balanced to include a primary repair server.
  • MTRS Multiple Repair Resource Servers
  • TRRS Multiple Repair Resource Servers
  • the MTRS is mainly responsible for authenticating the PDP and the terminal to be repaired, and is directed to the corresponding TRRS according to the trusted attribute information to be repaired by the terminal to be repaired.
  • FIG. 5 a schematic diagram of a functional structure of an MTRS is provided.
  • the network interface module is configured to: receive and send data packets of the PDP and the TRA, perform simple packet parsing, and transmit the corresponding packet to the corresponding module for processing.
  • Identity authentication module Used to check and verify the identity information of the PDP and the terminal user to be repaired, and send the verification result to the network interface module.
  • TRRS management module locates the corresponding TRRS according to the error information of the terminal to be repaired, and manages the TRRS.
  • TRRS Information Library Mainly stores the repair items that each TRRS can repair, as well as the TRRS itself. Referring to Table 5, a schematic table of interaction of the MTRS with other communication objects is provided. Purpose of communication object communication (function) The PDP authenticates the access server PDP and receives the trusted attribute information to be repaired by the terminal to be repaired.
  • the PEP authenticates the repaired terminal through the redirection of the PEP; and sends the trusted repair resource to the corresponding terminal through the PEP, and the TRRS (at least one) searches for the repair resource according to the trusted attribute information to be repaired, and transmits the repair resource through the MTRS.
  • the network interface module is configured to: communicate with the MTRS, receive the repair item information sent by the MTRS, and send the repaired resource to the MTRS.
  • Repair resource management module Used to manage trusted repair resources, including resource lookup and resource update.
  • Resource lookup module Used to find repair resources.
  • Resource Update Module Used to add, delete, and modify repair resources.
  • Repair Resource Library Mainly stores trusted repair resource files.
  • TRRS The entity that communicates with TRRS only has MTRS, and its communication function is to accept the trusted repair information of MTRS, and according to the indication, find the corresponding repair resource address.
  • TRRS can be provided and maintained by different vendors to provide different types or vendors of repair resources, such as TRRS1 to provide anti-virus software recovery resources, TRRS2 to provide firewall repair resource projects, and so on.
  • FIG. 7 is a schematic diagram of a repairable network system according to an embodiment of the present invention.
  • a trusted access authentication method combining Diameter and PANA protocols may be implemented, and the PANA protocol and the Diameter protocol are used for authentication.
  • the underlying security carrier of information may be implemented, and the PANA protocol and the Diameter protocol are used for authentication.
  • the embodiment of the present invention provides a method for repairing data, by adding a trusted repair server and a trusted repair module (TRA) based on the existing TNC architecture, and realizing After entering the trusted network, the user terminal that cannot access the trusted network due to the failure of the integrity verification can provide the automatic trusted repair process, so that the user terminal can automatically complete the repair process and successfully access the trusted network.
  • TRA trusted repair module
  • the humanized repair service is provided to the end user, and the user only needs to select the trusted repair, that is, the repair can be performed by the convenient and reliable trusted repair wizard, thereby avoiding the trouble of the manual repair by the user; and the trusted repair server to the PDP and the terminal Identity authentication not only ensures the security of the trusted repair server, but also enables users to get reliable repair services, while also reducing the probability of PDP attacks.
  • the terminal to be repaired communicates with the trusted repair network through PEP redirection, which ensures the isolation of the repair network and the user, and further ensures the security of the repair server. Since the trusted repair resource server is maintained and managed by multiple repair service providers, it provides economic benefits for the trusted repair service provider while providing users with secure and reliable trusted repair resources.
  • an embodiment of the present invention provides a system for repairing data, where the system includes: a terminal 801 and a repair server 802, where
  • the terminal 801 is configured to send a verification message; after the identity verification is passed, send a resource request message to the repair server 802, receive the resource sent by the repair server 802, and repair the data according to the resource;
  • the repair server 802 is configured to receive the verification message sent by the terminal 801, verify the validity of the terminal according to the pre-stored terminal identity information, and receive the resource request message sent by the terminal 801 to determine whether the resource required by the terminal can be provided. Sending resources to the terminal 801.
  • the repair server in order to balance the load of the repair server, may be designed to include: a primary repair server and at least one repair resource server, and correspondingly,
  • the primary repair server is configured to receive the verification message sent by the terminal, and the verification message carries the identity information of the terminal, and the terminal is verified according to the pre-stored terminal identity information; and is further configured to receive the resource request message sent by the terminal, and determine whether the resource server is repaired. Providing resources required by the terminal, and if yes, acquiring resources from the repair resource server, and forwarding the resources to the terminal;
  • the system also includes a decision server,
  • the decision server is configured to send an access failure message to the terminal, and send the verification message of the terminal to the repair server.
  • the verification message of the terminal includes the terminal identifier and resource information required by the terminal.
  • the decision server and the repair server need to perform mutual authentication, and thus;
  • the decision server is further configured to send an authentication message to the repair server, where the identity verification message carries the identifier of the decision server; and is further configured to receive the identity verification message sent by the repair server, where the identity verification message carries the identifier of the repair server, according to the repair server The identity authenticates the repair server.
  • the repair server is further configured to receive the authentication server to send the identity verification information, where the identity verification information carries the identifier of the decision server, and the identity determination server performs identity verification according to the identifier of the decision server.
  • the isolation between the repair server and the terminal is implemented, and the system further includes an execution server between the terminal and the repair server, wherein the execution server is configured to forward the message between the terminal and the repair server.
  • the embodiment of the present invention provides a system for repairing data, which is provided to a user terminal that cannot access the trusted network due to failure of integrity verification during the process of accessing the trusted network by using the trusted repair server.
  • the trusted repair process enables the user terminal to automatically complete the repair process and successfully access the trusted network.
  • the humanized repair service is provided to the end user, and the user only needs to select the trusted repair, that is, the repair can be performed by the convenient and reliable trusted repair wizard, thereby avoiding the trouble of the manual repair by the user; and the trusted repair server to the PDP and the terminal Identity authentication not only ensures the security of the trusted repair server, but also enables users to get reliable repair services, while also reducing the probability of PDP attacks.
  • Example 3 Referring to FIG. 10, an embodiment of the present invention provides a terminal device, where the terminal device includes:
  • the sending module 1001 is configured to send the verification message and the resource request information to the repair server.
  • the receiving module 1002 is configured to receive, by the repair server, the resource sent by the repair server, where the resource is obtained by the repair server after verifying that the terminal device passes the verification information, and is obtained and sent when determining that the resource can be provided;
  • the repair module 1003 is configured to repair its own data according to the resource received by the receiving module 1001.
  • an embodiment of the present invention provides a repair server, where the repair server includes:
  • the receiving module 901 is configured to receive a verification message sent by the terminal.
  • the verification module 902 is configured to verify the validity of the terminal according to the terminal identity information stored by the terminal and the verification message of the terminal received by the receiving module 901.
  • the processing module 903 is configured to: when the result of the verification by the verification module 902 is legal, receive the resource request message sent by the terminal, determine whether the resource required by the terminal can be provided, and if yes, deliver the resource to the terminal.
  • the repair server also includes:
  • the resource providing module is configured to provide the processing module with resources required by the terminal.
  • the repair server may be designed to include: a primary repair server and at least one repair resource server (ie, corresponding to the resource providing module described above).
  • the repair server further includes:
  • the second verification module is configured to receive the identity verification information sent by the decision server, where the identity verification information carries the identifier of the decision server, and performs identity verification on the decision server according to the identifier of the decision server.
  • an embodiment of the present invention provides a decision server, where the decision server includes:
  • the verification module 1101 is configured to perform integrity verification on the terminal.
  • the sending module 1102 is configured to: after the verification module 1101 fails the integrity verification on the terminal, send an access failure message to the terminal, and send the verification information of the terminal acquired in the process of verifying the integrity of the terminal to the repair server, where The verification information of the terminal includes the terminal identifier and resource information required by the terminal.
  • the verification module 1101 is further configured to receive an identity verification message sent by the repair server, where the identity verification message carries an identifier of the repair server, and performs identity verification on the repair server according to the identifier of the repair server.
  • the sending module 1102 is further configured to: Send an authentication message to the repair server, where the identity verification message carries the identity of the decision server.
  • AAA Authentication, Authorization, and Accounting
  • the fee structure is implemented, and more repair methods can be added, and the repair method of the present invention is used as an alternative method to meet more advanced repair requirements: for example, different repair methods may charge different fees, Terminals with different repair methods that reach the trusted access level may adopt different authentication methods and authorization methods. This requires information communication between the trusted repair network and the AAA server.
  • Some of the steps in the embodiment of the present invention may be implemented by software, and the corresponding software program may be stored in a readable storage medium such as an optical disk or a hard disk.

Description

一种修复数据的方法、 系统和装置 本申请要求于 2008年 03月 18 日提交中国专利局、 申请号为 200810102129.8、 发 明名称为"一种修复数据的方法、 系统和装置"的中国专利申请的优先权, 其全部内容通 过引用结合在本申请中。 技术领域
本发明涉及通信领域, 特别涉及一种修复数据的方法、 系统和装置。 背景技术
互联网络自出现以来受到了广泛的应用, 人们对其依赖也日益增强, 但由于目前互联 网中普遍存在的脆弱性和网络提供服务能力的有限性, 大大降低了网络的可信任程度, 例 如: 对于试图接入某些特定网络的可管理或不可管理的终端用户, 虽然网络供应商可以运 用现有的标准技术来限制对网络的访问, 然而面对很多来自网络内部的恶意攻击仍然束手 无策。 要解决内部安全威胁, 就需要建立一个信息的信任传递模式。 信息安全的核心正在 向"可信任"转变。
可信性比安全性更富有广泛的技术内涵, 可信的互联网络应该具有如下特性:
(1) 实现传统意义上的安全性, 即系统和信息的保密性、 完整性、 可用性;
(2) 真实性 (authenticity), 即用户身份、 信息来源、 信息内容的真实性;
(3) 可审计性 (accountability), 即网络实体发起的任何行为都可追踪到实体本身;
(4) 私密性 (privacy), 即用户的隐私是受到保护的, 某些应用是可匿名的;
(5) 抗毁性 (survivability), 在系统故障、 恶意攻击的环境中, 能够提供有效的服务; (6) 可控性 (controllability), 是指对违反网络安全策略的行为具有控制能力。
由康柏、 惠普、 IBM、 Intel和微软牵头组织了可信计算组织 (Trusted Computing Group, TCG), 致力于在计算平台体系结构上增强其安全性, 为高可信计算制定开放的标准, 并发 布了可信平台模块 CTrusted Platform Module, TPM)规范, 为了给 TCG发布的 TPM提供一种 应用支持, TCG发布了 TNC(Trusted Network Connect, 可信网络连接)规范。 其主要目的是 通过使用可信主机提供的终端技术, 实现网络访问控制的协同工作。 参见图 1, 为 TNG提供的 TNC体系结构示意图。 其中, 可信网络连接技术 TNC是建 立在基于主机的可信计算技术之上的。 基于 TNC开放规范的解决方案可确保试图接入网络 的终端设备满足网络运营商规定的来源、 完整性状态和安全要求及其他安全策略, 其中;
1 . 网络访问请求者 (Access Requestor, AR)是请求访问受保护网络的实体(可能是一台 或多台物理计算机或者是一个驻留在计算机中的独立程序)。 其中, AR 中按照功能划分有 三个模块:
网络访问请求模块(NAR, Network Access Requestor)用来发起网络请求; 可信客户端 模块 (TNCC, TNC Client)主要负责收集可信信息, 并将这些信息发送给对端的可信服务模 块 (TNCS, TNC Server) 进行可信验证; 可信信息测量模块 (IMC, Integrity Measurement Collectors)负责测量与 AR实体完整性相关的可信信息, 例如操作系统安全性、 杀毒软件、 防火墙、 应用软件版本等信息, 该实体中可能有一个或多个可信信息测量模块;
2. 策略执行点 (; Policy Enforcement Point, PEP): 该实体中只有 PEP模块, 其功能是控 制对受保护的可信网络的访问, 与 PDP交互并决定是否允许 AR访问网络;
3 . 策略决策点 (Policy Decision Point, PDP): 根据特定的网络访问策略, 检查 AR的 访问认证, 决定是否授权访问的网络实体。 其中, PDP按照功能划分有三个模块:
网络访问认证模块 (NAA, Network Access Authority)用于决定 AR是否应该得到访问授 权, 向可信服务端询问 AR的完整性是否满足本地安全策略; 可信服务端模块 (TNCS)用于 管理可信信息验证模块 (IMV, Integrity Measurement Verifiers) 和可信信息测量模块 (IMC) 之间的消息流向, 将验证结果与本地安全策略相比较, 做出最终的全局评估结果, 如验证 成功、 失败或建议修复等; 可信信息验证模块(IMV)用于验证从可信信息测量模块传递来 的可信信息, 一个 PDP中可能有多个可信信息验证模块。
在某终端完整性验证失败, 需要进入可信修复的过程中, 如果可信网络接入的过程缺 少修复环节, 那么对于没有满足可信网络完整性要求的接入用户, 将无法得知是由于什么 原因而无法访问可信网络, 或者无法通过一个安全可信的渠道获取修复数据。 用户只能通 过手动去下载可修复的资源, 这对于用户来说是一个相当繁琐且复杂的过程, 会影响用户 对可信网络使用的积极性, 给可信网络的普及带来负面影响。
发明人在实现本发明的过程中发现, 尽管 TCG组织的标准文档中, 在接入过程的提出 了关于修复的概念, 但是并没有给出功能描述和具体的实现方案。 发明内容
为了使用户终端在接入可信网络, 当完整性验证失败时, 给用户提供自动的可修复过 程, 从而使用户能够自动完成了修复过程后成功实现可信网络的接入, 本发明实施例提供 了一种修复数据的方法、 系统和装置。 所述技术方案如下:
一方面, 本发明实施例提供了一种修复数据的方法, 所述方法包括:
修复服务器接收终端发送的验证消息, 所述验证消息中携带所述终端的身份信息, 根 据自身预存的终端身份信息, 对所述终端的合法性进行验证;
当对所述终端的合法性验证成功后, 接收所述终端发送的资源请求消息, 判断是否能 够提供所述终端需要的资源, 如果是, 向所述终端下发所述资源, 所述资源用于修复所述 终端自身的数据。
一方面, 本发明实施例提供了一种修复数据的系统, 所述系统包括: 终端和修复服务 器, 其中,
所述终端, 用于向所述修复服务器发送验证消息; 在身份验证通过后, 向所述修复服 务器发送资源请求消息, 接收所述修复服务器发送的资源, 根据所述资源修复自身的数据; 所述修复服务器, 用于接收所述终端发送的验证消息, 根据自身预存的终端身份信息, 对所述终端的合法性进行验证, 接收所述终端发送的资源请求消息, 判断是否能够提供所 述终端需要的资源, 如果是, 向所述终端下发所述资源。
一方面, 本发明实施例提供了一种终端装置, 所述终端装置包括:
发送模块, 用于向修复服务器发送验证消息及资源请求信息;
接收模块, 用于接收所述修复服务器发送的资源, 所述资源由所述修复服务器根据验 证信息验证终端装置通过后, 在判断修复服务器能够提供所述资源时获取并发送的;
修复模块, 用于根据所述接收模块接收的资源修复自身的数据。
一方面, 本发明实施例提供了一种修复服务器, 所述修复服务器包括:
接收模块, 用于接收终端发送的验证消息;
验证模块, 用于根据自身存储的终端身份信息, 以及所述接收模块接收到的终端的验 证消息, 对所述终端的合法性进行验证;
处理模块, 用于当所述验证模块验证的结果为合法, 接收所述终端发送的资源请求消 息, 判断是否能够提供所述终端需要的资源, 如果是, 向所述终端下发所述资源。
一方面, 本发明实施例提供了一种决策服务器, 所述决策服务器包括:
验证模块, 用于对终端进行完整性验证;
发送模块, 用于在所述验证模块对终端进行完整性验证失败后, 向所述终端发送接入 失败消息, 并将在验证终端完整性过程中获取的终端的验证信息发送给修复服务器, 所述 终端的验证信息包括终端标识、 终端需要的资源信息。 本发明实施例提供的技术方案的有益效果是: 通过可信修复网络的引入, 当终端完整 性验证失败, 需要进入可信修复的过程中, 实现用户自动获取可修复的资源, 从而利用该 资源对用户自身的不完整性的数据进行修复, 提高了用户的体验, 增加了用户的满意度, 大大提高了用户对可信网络使用的积极件, 有力地促进了可信网络的普及。 附图说明
图 1是现有技术提供的可信网络的网络体系结构示意图;
图 2是本发明实施例 1提供的可信修复通信场景示意图;
图 3是本发明实施例 1提供的修复数据的方法流程图;
图 4是本发明实施例 1提供的终端 TRA的功能结构示意图;
图 5是本发明实施例 1提供的 MTRS的功能结构示意图;
图 6是本发明实施例 1提供的 TRRS的功能结构示意图;
图 7是本发明实施例 1提供的可信修复网络的网络体系结构示意图;
图 8是本发明实施例 2提供的修复数据的系统的示意图;
图 9是本发明实施例 4提供修复服务器的示意图;
图 10是本发明实施例 3提供的终端装置的示意图;
图 11是本发明实施例 5提供的决策服务器的示意图。 具体实施方式
为使本发明的目的、 技术方案和优点更加清楚, 下面将结合附图对本发明实施方式作 进一步地详细描述。
本发明实施例提供的技术方案, 通过在现有的 TNC体系结构的基础上, 增加可信修复 服务器和可信修复模块(TRA, Trusted Remediation Application), 实现了对那些在接入可信 网络时, 由于完整性验证失败无法接入可信网络的用户终端, 通过提供给其自动的可修复 过程, 从而使用户终端能够在自动完成了修复过程后成功实现可信网络的接入。 其中, 本 发明实施例提供了一种修复数据的方法, 该方法如下:
修复服务器接收终端发送的验证消息, 验证消息中携带终端的身份信息, 根据自身预 存的终端身份信息, 对终端的合法性进行验证;
当对终端的合法性验证成功后, 接收终端发送的资源请求消息, 判断是否能够提供终 端需要的资源, 如果是, 向终端下发资源;
终端接收修复服务器发送的资源, 根据资源修复自身的数据。 其中, 在具体实现了为了均衡修复服务器的负载, 提高效率, 上述修复服务器可以具 体设计为包括: 主修复服务器和至少一个修复资源服务器, 相应地, 方法具体为:
主修复服务器接收终端发送的验证消息, 验证消息中携带终端的身份信息, 根据自身 预存的终端身份信息, 对终端的合法件进行验证;
当对终端的合法性验证成功后, 主修复服务器接收终端发送的资源请求消息, 判断修 复资源服务器是否能够提供终端需要的资源, 如果是, 向修复资源服务器获取资源, 将资 源转发给终端;
终端接收修复服务器发送的资源, 根据资源修复自身的数据。
相应地, 上述向修复资源服务器获取资源, 将资源转发给终端的步骤具体可以通过以 下内容实现:
主修复服务器向修复资源服务器发送资源获取消息, 修复资源服务器判断是否能提供 资源, 如果是, 将资源发送主修复服务器, 主修复服务器将资源转发给终端。
在修复服务器接收终端发送的验证消息步骤, 之前还包括:
决策服务器向终端发送接入失败消息, 并将终端的验证消息发送给修复服务器, 终端 的验证消息包括终端标识、 终端需要的资源信息。
或者;
决策服务器向终端发送可信网络接入失败消息, 并将终端的身份信息发送给修复服务 器, 终端的身份消息包括终端标识;
相应地, 终端发送的资源请求消息中携带终端需要的资源信息。
为了保证修复数据获取的安全性, 该方法还可以包括: 决策服务器和修复服务器进行 身份验证, 如: 决策服务器向修复服务器发送身份验证消息, 身份验证消息中携带决策服 务器的标识, 修复服务器收到身份验证消息后, 根据决策服务器的标识对决策服务器进行 身份验证; 当修复服务器对决策服务器验证通过后, 修复服务器向决策服务器发送身份验 证消息, 身份验证消息中携带修复服务器的标识, 决策服务器收到身份验证消息, 根据修 复服务器的标识对修复服务器进行身份验证。 双向身份验证通过后执行上述方法提供的各 步骤。
为了保证终端和可信修复服务器的隔离状态, 保证修复数据获取的隐蔽性和安全性, 终端和修复服务器之间存在用于对终端和可信修复网络进行隔离的执行服务器, 该执行服 务器的具体功能如下:
修复服务器接收通过执行服务器转发的终端发送的验证消息, 根据自身预存的终端身 份信息, 对终端的合法性进行验证; 当对终端的合法性验证成功后, 接收通过执行服务器转发终端发送的资源请求消息, 判断是否能够提供终端需要的资源, 如果是, 通过执行服务器向终端下发资源;
终端接收通过执行服务器转发的修复服务器发送的资源, 根据资源修复自身的数据。 综上所述, 通过本发明实施例提供的方法, 实现了对用于修复的数据的获取, 保证了 用于提供修复数据的修复服务器的安全性和隐蔽性, 并且为了保证可信修复网络的安全性, 均衡了可信修复资源服务器的负载, 将可信修复资源服务器设计为具体包括: 主修复服务 器(MTRS, Main Trusted Remediation Server)和多个修复资源服务器(TRRS, Trusted Remediation Resource Server), 不同的 TRRS由不同的厂商进行资源的提供和维护。
在此基础上, 下面以多个实施例对本发明实施例提供的修复数据的方法进行详细的说 明。 以将本发明实施例提供的修复数据的方法应用于可信网络为例进行说明, 其中, 当终 端接入可信网络由于可信信息不完整, 需要进行修复, 自动获取到用于修复的数据, 从而 利用获取到的修复资源对自身的不完整性的可信数据进行修复, 详细内容如下: 实施例 1
参见图 2,为了详细说明本发明实施例提供了一种可信修复通信场景示意图。如图所示, 可信修复服务器包括一个主修复服务器 MTRS和多个修复资源服务器 TRRS ; 其中, TRS 和 TRRS 设置在与用户隔离的环境中, 被称为可信修复网络, 一个可信修复网络可以为多 个 PDP提供修复服务功能。 其中, MTRS对待修复终端和 PDP进行身份验证, 并根据要修 复的可信属性类型 (如操作系统安全性、 杀毒软件、 防火墙、 应用软件版本等信息) 定向 到各个 TRRS, TRRS由不同厂商提供, 为用户提供不同类型或厂商的修复资源。 可信修复 模块(TRA)是在接入终端新增的一个模块, 用来与用户交互。在图 2的基础上, 参见图 3, 本发明实施例提供了一种修复数据的方法, 其中, 该方法内容如下:
终端在接入可信网络的过程中, 当 PDP验证某一个接入终端完整性验证失败后, 会向 该终端发送完整性验证失败消息; 此时, 终端需要对自身现有的可信数据进行修复从而获 取完整的可信信息, 终端进入了可信修复过程, 步骤如下:
101: 终端接收 PDP发送的验证失败消息, 向 MTRS发送待终端身份验证消息, 并请 求查看修复措施, 该步骤具体实现如下:
终端接收到 PDP发送的验证失败消息后, 将修复信息和措施显示给用户, 并询问用户 是否进行可信修复, 如果用户不进行可信修复, 则结束; 如果用户确定进行可信修复后, 终端就向 MTRS发送终端的身份验证消息, 其中, 该身份验证消息中携带终端的标识和加 密算法 (如 MD5等); 102: MTRS收到终端发送的身份验证消息, 根据其中携带的终端标识, 对该终端进行 身份验证, 判断该终端是否合法; 如果是, 则执行 103 ; 否则, 执行 109;
其中, 由于终端在接入可信网络的过程中, 当 PDP验证某一个接入终端完整性验证失 败后, 会向该终端发送完整件验证失败消息, 其中, 验证失败消息和接入失败消息是一致 的, 即验证完整性失败等于终端接入可信网络失败。 同时, PDP也会向 MTRS发送携带该 待接入终端的信息的消息, 该消息中会携带该待接入终端标识、 加密算法 (其中, 加密算法 主要用于基于协议层的验证)以及该终端所需要的修复信息 (本实施例为了提高终端获取修 复资源的速度, 采用由 PDP向 MTRS发送该终端所需要的修复信息的方式为例进行说明) 等; MTRS会对该携带待接入终端的信息的消息进行保存, 如保存在自身的身份信息库中。 于是, 在 MTRS收到终端发送的身份验证消息后, 根据其中携带的终端标识, 查询 MTRS 自身的身份信息库, 通过查看是否存在该终端身份信息的标识对该终端的合法性进行判断, 如果存在则表明该终端合法, 否则, 表明该终端为非法用户, 拒绝为其提供可信修复服务。
103: MTRS认证用户合法后, 向终端返回身份认证成功的消息。
104: 终端收到身份认证成功的消息后, 向 MTRS发送可信修复资源请求消息。
105: MTRS收到终端发送的可信修复资源请求消息, 根据终端需要修复的项目信息, 判断是否能定向到相应的 TRRS, 如果是, 则执行 106; 否则, 执行 110。
其中, MTRS自身下挂管理多个 TRRS, 不同的 TRRS可以提供不同的可信修复项目资 源。 例如终端 A需要修复的项目为金山杀毒软件的版本号, 如果存在可以提供金山杀毒软 件的版本升级的项目资源 TRRS ,则表明 MTRS能够定向到相应的 TRRS。在 MTRS定向到 TRRS时, 具体可以通过项目资源标识实现, 参见表 1, 提供了一种实现定向的示意表。
表 1
Figure imgf000009_0001
如表 1所不, 提供了一种 MTRS实现 TRRS定向的不意表, 通过项目标识进行索引, 从而定向到相应的 TRRS。
106: MTRS向定向到的 TRRS下发获取修复资源指示, TRRS根据 MTRS的指示, 查 询自身获取相应的可信修复资源, 将相应可信修复资源返回给 MTRS。
其中,当 TRRS根据 MTRS的指示,査询自身无法获取相应的可信修复资源时,向 MTRS 返回查询失败的应答消息。
107: MTRS将获取到的可信修复资源, 发送给终端。 108: 终端获取到可信修复资源后, 根据自身的需要对资源进行相应的处理, 如安装、 或者覆盖等操作, 完成对自身原来不完整的数据的修复, 结束。
其中, 当终端完成了可信修复过程后, 由于对自身的数据进行了修复, 从而可以进行 可信网络的重新接入。
109: MTRS通知终端, 拒绝为终端提供可信修复资源, 结束。
110: MTRS通知终端无法提供可信修复资源, 无法进行修复, 结束。
进一步地, 为了确保可信网络的安全性, 可以将上述终端与 MTRS的通信通过 PEP的 重定向来完成, 即用户只能通过 PEP重定向到该可信修复网络环境中, 其中, 利用 PEP进 行重定向的过程如下:
首先, PEP为了实现通信的重定向, 所需要的数据结构如下:
1 ) 过滤 EP表: 至少包含终端 IP地址 (AR_IP)、 过滤器 ID (FILTER ID), 以及超时 时间(EXPIRETIME)三个表项, 该表的作用是根据过滤规则决定将待修复终端定向到修复 网络中。 如表 2所示, 其中, AR—ADDRESS指明了终端的 IP地址标识, FILTER_ID指明 了该终端是否需要进行可信修复接入, 如当 FILTER_ID的字段为 SUCCEED时, 表示该终 端为已经成功接入可信网络; 如当 FILTER_ID的字段为 FIXJJP时, 表示该终端需要进行 可信修复等等。
表 2
Figure imgf000010_0001
2) 重定向 Redirect表: 至少包含终端的 IP 地址 CAR_IP)、 终端用于修复过程的端口 (AR PORT) 和 PEP用于修复过程的端口 (PEP_PORT) 三个表项, 该表的作用是实现修 复过程中重定向的功能。 即当表 1 中的 FILTER_ID的字段为 FIXJJP时, 启用该 Redirect 表, 参见表 3, 提供了 Redirect表的示意表。
表 3
Figure imgf000010_0002
PEP实现重定向的过程如下:
首先, PEP等待接收 PDP验证某个终端的完整性结果信息, 并将相关信息(终端 IP地 址, 过滤器 ID) 记录到过滤表中; EP过滤器按照过滤表中的规则, 对到来消息进行过滤; 若该消息是 PDP指示该终端需要进行修复, 则将 EP表中的 FILTER ID更改为 FIX UP; 然后, 当有待修复的终端访问时, Redirect表记录下终端的 IP地址和用于修复过程的 端口, 并将消息的目的 IP地址改为可信修复服务器的 IP地址, 源 IP地址改为 PEP的 IP地 址, 源端口改为 PEP用于修复过程的唯一端口; 根据可信修复服务器的目的 IP地址, PEP 将消息转发至可信修复服务器;
然后, 当可信修复服务器回应终端时, 通过 PEP用于修复过程的唯一端口, 查找到终 端的 IP地址和修复端口, 将消息的目的 IP地址改为终端的 IP地址, 目的端口改为 AR的 修复端口, 根据该终端的 IP地址, PEP将该应答消息转发至终端。
综上, 此过程即实现了 PEP的重定向功能, 对客户端隐藏了修复服务器, 提高了可信 修复过程的安全性。 当该待修复终端的修复结束后, 过滤表和重定向表中该终端对应的记 录将被删除, 终端可以进行重新接入可信网络的认证。
综上过程, 实现了 PEP的重定向功能, 对做为客户端的终端隐藏了可信修复网络, 提 高了可信修复过程的安全性。
进一步地, 为了确保可信修复网络的安全性, 当需要可信修复网络提供服务时, MTRS 要对 PDP进行身份验证(身份验证可以在 PDP启动时发起或者在终端完整性验证失败后发 起等等)。 只有当身份验证成功后, MTRS才可与 PDP进行和待修复终端相关的通信(例如 MTRS接收 PDP发送的修复终端信息和待修复项目信息等等), 其中, 同一个可信修复网络 可以为多个 PDP提供修复服务。 决策服务器和修复服务器进行双向身份验证可以通过如下 方式实现:
决策服务器向修复服务器发送身份验证消息, 身份验证消息中携带决策服务器的标识, 修复服务器收到身份验证消息后, 根据决策服务器的标识对决策服务器进行身份验证; 当修复服务器对决策服务器验证通过后, 修复服务器向决策服务器发送身份验证消息, 身份验证消息中携带修复服务器的标识, 决策服务器收到身份验证消息, 根据修复服务器 的标识对修复服务器进行身份验证。
其中,上述本发明实施例以 MTRS和 PDP的身份验证在 PDP启动时已经完成为例, 即 上述 101— 110中涉及到的 PDP都是已经和 MTRS完成了认证通过的。
综上所述, 通过在现有的 TNC体系结构的基础上, 增加可信修复服务器和可信修复模 块 TRA, 实现了对那些在接入可信网络, 由于完整性验证失败无法接入可信网络的用户终 端, 通过提供给其自动的可修复过程, 从而使用户终端能够自动完成了修复过程后成功实 现可信网络的接入。
其中, 下面进一步地, 对本实施例中涉及到的嵌入了 TRA的终端, 以及可信修复服务 器 (包括主修复服务器 MTRS和修复资源服务器 TRRS) 如何具体实现进行描述: 由于终端的可信修复服务要与用户进行交互, 而这个交互过程无法通过终端现有的 IMC 等其他模块来实现, 因此每个终端包括一个可信修复客户端模块, 称为可信修复应用 程序 (TRA)。 其功能主要用于接收并解析需要修复的可信属性信息, 将修复措施和建议显 示给用户; 接收并处理可信修复资源 (安装、 覆盖等), 完成可信修复过稈。 参见图 4, 提 供了 TRA的功能结构示意图, 其中, IMC接口模块: 处理 TRA与 IMC进行数据交互的过 程: 包括接收 IMC接口模块传给 TRA的数据, 并将错误信息发送给错误信息解析模块。错 误信息解析模块: 接收某个验证失败的完整性属性信息, 并对该信息进行解析。 NAR接口 模块: 处理 TRA与 NAR进行数据交互的过程。 包括接收和发送 NAR模块传给 TRA的请 求和应答报文, 并将相应报文传给 MTRS以便客户端能够连接 MTRS进行可信修复。 过程 处理模块: 接收可信修复资源, 并完成安装覆盖等修复过程。 参见表 4, 提供了该 TRA与 其它通信对象进行交互的示意表。
表 4
Figure imgf000012_0001
可信修复服务器是处于相对于用户隔离的环境, 也称为可信修复网络, 为了保证可信 修复网络的安全性, 均衡可信修复资源服务器的负载, 可以设计为包括一个主修复服务器
(MTRS)和多个修复资源服务器 (TRRS):
其中, MTRS的主要负责对 PDP和待修复终端进行身份认证, 并根据待修复终端要修 复的可信属性信息定向到相应的 TRRS。参见图 5,提供了 MTRS的功能结构示意图,其中, 网络接口模块: 用于接收和发送 PDP和 TRA的数据报文, 进行简单的报文解析, 将相应的 报文传给相应的模块进行处理。 身份认证模块: 用于核对和验证 PDP和待修复终端用户的 身份信息, 并将验证结果发送到网络接口模块。 TRRS管理模块: 根据待修复终端的错误信 息定位到相应的 TRRS, 并对 TRRS进行管理。 身份信息库: 主要存储 PDP的身份信息和 待修复终端的身份信息。 TRRS信息库: 主要存储每个 TRRS 能够修复的修复项目, 以及 TRRS自身的信息。 参见表 5, 提供了该 MTRS与其它通信对象进行交互的示意表。 通信对象 通信的目的 (功能) PDP 对接入服务器 PDP进行身份认证, 接收待修复终端要修复的可信属性信息
PEP 通过 PEP的重定向对待修复终端进行身份认证; 并将可信修复资源通过 PEP 发送至对应终端 其中, TRRS (至少一个)根据要修复的可信属性信息查找修复资源,并将其通过 MTRS 传送至终端。 参见图 6, 提供了 TRRS 的功能结构示意图, 其中, 网络接口模块: 用于与 MTRS进行通信, 接收 MTRS发来的修复项目信息, 并将查到的修复资源发送给 MTRS。 修复资源管理模块: 用于管理可信修复资源, 包括资源查找和资源更新。 资源查找模块: 用于査找修复资源。 资源更新模块: 用于对修复资源进行添加、 删除和修改的操作。 修复 资源库: 主要存储可信修复资源文件。 与 TRRS通信的实体只有 MTRS, 其通信功能是接 受 MTRS 的可信修复信息, 根据指示, 查找相应修复资源地址。 TRRS可以由不同的厂商 提供并进行维护, 从而提供不同类型或厂商的修复资源, 例如 TRRS1提供杀毒软件修复资 源项目, TRRS2提供防火墙修复资源项目等等。
参见图 7, 为本发明实施例提供的可修复网络体系示意图, 其中在具体实现时, 可以采 用 Diameter和 PANA协议相结合的可信接入认证方式来实现,把 PANA协议与 Diameter协 议用做认证信息的下层安全载体。
综上所述, 本发明实施例提供了一种修复数据的方法, 通过在现有的 TNC体系结构的 基础上, 增加可信修复服务器和可信修复模块 (TRA), 实现了对那些在接入可信网络, 由 于完整性验证失败无法接入可信网络的用户终端, 通过提供给其自动的可信修复过程, 从 而使用户终端能够自动完成修复过程后成功实现可信网络的接入。 向终端用户提供了人性 化的修复服务, 用户只需选择可信修复, 即可以通过方便可靠的可信修复向导进行修复, 避免了用户手动修复的麻烦; 并且可信修复服务器对 PDP和终端的身份认证不仅确保了可 信修复服务器的安全性, 而且使用户能到可靠的修复服务, 同时也有效减少了 PDP受攻击 的概率。 待修复终端与可信修复网络通过 PEP的重定向进行通信, 保证了修复网络与用户 的隔离, 也进一步确保了修复服务器的安全性。 由于可信修复资源服务器由多个修复服务 提供商负责维护管理, 在为用户提供安全可靠的可信修复资源的同时也为可信修复服务提 供商产生了经济效益。
实施例 2
参见图 8, 本发明实施例提供了一种修复数据的系统, 系统包括: 终端 801和修复服务 器 802, 其中,
终端 801, 用于发送验证消息; 在身份验证通过后, 向修复服务器 802发送资源请求消 息, 接收修复服务器 802发送的资源, 根据资源修复自身的数据; 修复服务器 802, 用于接收终端 801发送的验证消息, 根据自身预存的终端身份信息, 对终端的合法性进行验证, 接收终端 801 发送的资源请求消息, 判断是否能够提供终端需 要的资源, 如果是, 向终端 801下发资源。
其中, 在具体实现该系统的时候, 为了均衡修复服务器的负载, 修复服务器可以被设 计成包括: 主修复服务器和至少一个修复资源服务器, 相应地,
主修复服务器, 用于接收终端发送的验证消息, 验证消息中携带终端的身份信息, 根 据自身预存的终端身份信息, 验证终端合法; 还用于接收终端发送的资源请求消息, 判断 修复资源服务器是否能够提供终端需要的资源, 如果是, 向修复资源服务器获取资源, 将 资源转发给终端;
修复资源服务器, 用于向主修复服务器提供资源。
该系统还包括决策服务器,
决策服务器, 用于向终端发送接入失败消息, 并将终端的验证消息发送给修复服务器, 终端的验证消息包括终端标识、 终端需要的资源信息。
为了确保资源获取的安全性和可靠性, 决策服务器和修复服务器需要进行双向认证, 于是;
决策服务器, 还用于向修复服务器发送身份验证消息, 身份验证消息中携带决策服务 器的标识; 还用于接收修复服务器发送的身份验证消息, 身份验证消息中携带修复服务器 的标识, 根据修复服务器的标识对修复服务器进行身份验证。
相应地, 修复服务器还用于接收决策服务器发送身份验证信息, 身份验证信息中携带 决策服务器的标识, 根据决策服务器的标识对决策服务器进行身份验证。
为了进一步地保证修复的安全性和可靠性, 实现修复服务器和终端的隔离, 系统还包 括位于终端和修复服务器之间的执行服务器, 其中, 执行服务器, 用于转发终端和修复服 务器之间的消息。
本发明实施例提供了一种修复数据的系统, 通过可信修复服务器对那些在接入可信网 络过程中, 由于完整性验证失败无法接入可信网络的用户终端, 通过提供给其自动的可信 修复过程, 从而使用户终端能够自动完成了修复过程后成功实现可信网络的接入。 向终端 用户提供了人性化的修复服务, 用户只需选择可信修复, 即可以通过方便可靠的可信修复 向导进行修复, 避免了用户手动修复的麻烦; 并且可信修复服务器对 PDP和终端的身份认 证不仅确保了可信修复服务器的安全性, 而且使用户能到可靠的修复服务, 同时也有效减 少了 PDP受攻击的概率。
实施例 3 参见图 10, 本发明实施例提供了一种终端装置, 终端装置包括:
发送模块 1001, 用于向修复服务器发送验证消息及资源请求信息;
接收模块 1002, 用于接收修复服务器发送的资源, 所述资源由所述修复服务器根据验 证信息验证终端装置通过后, 在判断能够提供所述资源时获取并发送的;
修复模块 1003, 用于根据接收模块 1001接收的资源修复自身的数据。
实施例 4
参见图 9, 本发明实施例提供了一种修复服务器, 修复服务器包括:
接收模块 901, 用于接收终端发送的验证消息;
验证模块 902, 用于根据自身存储的终端身份信息, 以及接收模块 901接收到的终端的 验证消息, 对终端的合法性进行验证;
处理模块 903,用于当验证模块 902验证的结果为合法,接收终端发送的资源请求消息, 判断是否能够提供终端需要的资源, 如果是, 向终端下发资源。
其中, 修复服务器还包括:
资源提供模块, 用于向处理模块提供终端需要的资源。
其中, 在具体实现该修复服务器的时候, 为了均衡修复服务器的负载, 修复服务器可 以被设计成包括: 主修复服务器和至少一个修复资源服务器 (即对应于上述的资源提供模 块)。
进一步地, 为了确保资源获取的安全性和可靠性, 当需要和决策服务器进行双向认证 时, 修复服务器还包括:
第二验证模块, 用于接收决策服务器发送身份验证信息, 身份验证信息中携带决策服 务器的标识, 根据决策服务器的标识对决策服务器进行身份验证。
实施例 5
参见图 11, 本发明实施例提供了一种决策服务器, 决策服务器包括:
验证模块 1101, 用于对终端进行完整性验证;
发送模块 1102, 用于在验证模块 1101对终端进行完整性验证失败后, 向所述终端发送 接入失败消息, 并将在验证终端完整性过程中获取的终端的验证信息发送给修复服务器, 所述终端的验证信息包括终端标识、 终端需要的资源信息。
进一步地, 验证模块 1101, 还用于接收修复服务器发送的身份验证消息, 所述身份验 证消息中携带修复服务器的标识, 根据修复服务器的标识对修复服务器进行身份验证; 发送模块 1102, 还用于向修复服务器发送身份验证消息, 该身份验证消息中携带决策 服务器的标识。 本发明实施例提供的技术方案还适用于认证、 授权、 计费的 AAA ( Authentication, Authorization, and Accounting, 认证, 授权, 计费)领域, 可以通过在可信修复过程中添加 相应的授权与计费结构来实现, 也可添加结合更多的修复方法, 把本发明的修复方法作为 一个可选的办法, 以满足更为高级的修复需求: 例如不同的修复方法可能会收取不同的费 用, 采用不同修复方法达到可信接入等级的终端, 可以采取不同的认证方法以及授权方法。 这就要求可信修复网络与 AAA服务器之间具有信息通信。
本发明实施例中的部分步骤, 可以利用软件实现, 相应的软件程序可以存储在可读取 的存储介质中, 如光盘或硬盘等。
以上所述仅为本发明的具体实施例, 并不用以限制本发明, 对于本技术领域的普通技 术人员来说, 凡在不脱离本发明原理的前提下, 所作的任何修改、 等同替换、 改进等, 均 应包含在本发明的保护范围之内。

Claims

权 利 要 求 书
1.一种修复数据的方法, 其特征在于, 所述方法包括:
修复服务器接收终端发送的验证消息, 所述验证消息中携带所述终端的身份信息, 根据 自身预存的终端身份信息, 对所述终端的合法性进行验证;
当对所述终端的合法性验证成功后, 接收所述终端发送的资源请求消息, 判断是否能够 提供所述终端需要的资源, 如果是, 向所述终端下发所述资源, 所述资源用于修复所述终端 自身的数据。
2. 如权利要求 1所述的修复数据的方法, 其特征在于, 所述修复服务器包括: 主修复服 务器和至少一个修复资源服务器, 所述方法为:
主修复服务器接收终端发送的验证消息, 所述验证消息中携带所述终端的身份信息, 根 据自身预存的终端身份信息, 对所述终端的合法性进行验证;
当对所述终端的合法性验证成功后, 所述主修复服务器接收所述终端发送的资源请求消 息, 判断所述修复资源服务器是否能够提供所述终端需要的资源, 如果是, 向所述修复资源 服务器获取所述资源, 将所述资源转发给所述终端。
3. 如权利要求 2所述的修复数据的方法, 其特征在于, 所述主修复服务器向所述修复资 源服务器获取所述资源, 将所述资源转发给所述终端, 具体为:
所述主修复服务器向所述修复资源服务器发送资源获取消息, 所述修复资源服务器判断 是否能提供所述资源, 如果是, 将所述资源发送所述主修复服务器, 所述主修复服务器将所 述资源转发给所述终端。
4. 如权利要求 1所述的修复数据的方法, 其特征在于, 所述修复服务器接收终端发送的 验证消息的步骤之前还包括:
所述修复服务器接收决策服务器在向所述终端发送接入失败消息后发送的所述终端的验 证消息, 所述终端的验证消息包括终端标识、 终端需要的资源信息。
5. 如权利要求 1所述的修复数据的方法, 其特征在于, 所述修复服务器接收终端发送的 验证消息的步骤之前还包括:
所述修复服务器接收决策服务器在向所述终端发送可信网络接入失败消息后发送的所述 终端的身份信息, 所述终端的身份消息包括终端标识。
6. 如权利要求 4或 5所述的修复数据的方法, 其特征在于, 所述方法还包括: 所述修复服务器接收所述决策服务器发送的身份验证消息, 所述身份验证消息中携带决 策服务器的标识, 所述修复服务器收到所述身份验证消息后, 根据所述决策服务器的标识对 所述决策服务器进行身份验证;
当所述修复服务器对所述决策服务器验证通过后, 所述修复服务器向所述决策服务器发 送身份验证消息, 所述身份验证消息中携带所述修复服务器的标识, 所述修复服务器的标识 用于使所述决策服务器对所述修复服务器进行身份验证。
7. 如权利要求 1所述的修复数据的方法, 其特征在于, 所述方法具体为:
修复服务器接收通过所述执行服务器转发的所述终端发送的验证消息, 根据自身预存的 终端身份信息, 对所述终端的合法性进行验证;
当对所述终端的合法性验证成功后, 接收通过所述执行服务器转发所述终端发送的资源 请求消息, 判断是否能够提供所述终端需要的资源, 如果是, 通过所述执行服务器向所述终 端下发所述资源。
8.一种修复数据的系统,其特征在于,所述系统包括: 终端(801 )和修复服务器(802), 其中,
所述终端(801 ), 用于向所述修复服务器(802 )发送验证消息; 在身份验证通过后, 向 所述修复服务器 (802 ) 发送资源请求消息, 接收所述修复服务器 (802 ) 发送的资源, 根据 所述资源修复自身的数据;
所述修复服务器(802), 用于接收所述终端(801 )发送的验证消息, 根据自身预存的终 端身份信息, 对所述终端 (801 ) 的合法性进行验证, 接收所述终端 (801 ) 发送的资源请求 消息, 判断是否能够提供所述终端 (801 ) 需要的资源, 如果是, 向所述终端 (801 ) 下发所 述资源。
9. 如权利要求 8所述修复数据的系统, 其特征在于, 所述修复服务器包括: 主修复服务 器和至少一个修复资源服务器, 相应地,
所述主修复服务器, 用于接收终端发送的验证消息, 根据自身预存的终端身份信息, 验 证所述终端合法; 还用于接收所述终端发送的资源请求消息, 判断所述修复资源服务器是否 能够提供所述终端需要的资源, 如果是, 向所述修复资源服务器获取所述资源, 将所述资源 转发给所述终端;
所述修复资源服务器, 用于向所述主修复服务器提供所述资源。
10. 如权利要求 8所述所述修复数据的系统, 其特征在于, 所述系统还包括决策服务器, 所述决策服务器, 用于在对终端进行完整性失败后, 向所述终端发送接入失败消息, 并 将所述终端的验证消息发送给所述修复服务器, 所述终端的验证消息包括终端标识、 终端需 要的资源信息。
11 . 如权利要求 10所述所述修复数据的系统, 其特征在于, 所述决策服务器, 还用于向 所述修复服务器发送身份验证消息, 所述身份验证消息中携带决策服务器的标识, 还用于当 接收所述修复服务器发送的身份验证消息,所述身份验证消息中携带所述修复服务器的标识, 根据所述修复服务器的标识对所述修复服务器进行身份验证;
相应地, 所述修复服务器, 还用于接收所述决策服务器发送身份验证信息, 所述身份验 证信息中携带决策服务器的标识, 根据所述决策服务器的标识对所述决策服务器进行身份验 证。
12. 如权利要求 8-11任意一项权利要求所述修复数据的系统, 其特征在于, 所述系统还 包括位于所述终端和所述修复服务器之间的执行服务器,
所述执行服务器, 用于转发所述终端和所述修复服务器之间的消息。
13. 一种终端装置, 其特征在于, 所述终端装置包括:
发送模块 (1001 ), 用于向修复服务器发送验证消息及资源请求信息;
接收模块(1002), 用于接收所述修复服务器发送的资源, 所述资源由所述修复服务器根 据验证信息验证终端装置通过后, 在判断修复服务器能够提供所述资源时获取并发送的; 修复模块 (1003), 用于根据所述接收模块 (1002 ) 接收的资源修复自身的数据。
14. 一种修复服务器, 其特征在于, 所述修复服务器包括:
接收模块 (901 ), 用于接收终端发送的验证消息;
验证模块(902), 用于根据自身存储的终端身份信息, 以及所述接收模块(901 )接收到 的终端的验证消息, 对所述终端的合法性进行验证;
处理模块(903), 用于当所述验证模块(902 )验证的结果为合法时, 接收所述终端发送 的资源请求消息, 判断是否能够提供所述终端需要的资源, 如果是, 向所述终端下发所述资 源。
15. 如权利要求 14所述修复服务器, 其特征在于, 所述修复服务器还包括:
资源提供模块, 用于向所述处理模块提供所述终端需要的资源。
16. 如权利要求 14所述修复服务器, 其特征在于, 所述修复服务器还包括:
第二验证模块, 用于接收决策服务器发送的身份验证信息, 所述身份验证信息中携带决 策服务器的标识, 根据所述决策服务器的标识对所述决策服务器进行身份验证。
17. 一种决策服务器, 其特征在于, 所述决策服务器包括:
验证模块 (1101 ), 用于对终端进行完整性验证; 发送模块(1102), 用于在所述验证模块(1101 )对终端进行完整性验证失败后, 向所述 终端发送接入失败消息, 并将在验证终端完整性过程中获取的终端的验证信息发送给修复服 务器, 所述终端的验证信息包括终端标识、 终端需要的资源信息。
18. 如权利要求 17所述决策服务器, 其特征在于,
所述验证模块(1101 ), 还用于接收所述修复服务器发送的身份验证消息, 所述身份验证 消息中携带所述修复服务器的标识, 根据所述修复服务器的标识对所述修复服务器进行身份 验证;
所述发送模块(1102), 还用于向修复服务器发送身份验证消息, 所述身份验证消息中携 带决策服务器的标识。
PCT/CN2009/070815 2008-03-18 2009-03-16 一种修复数据的方法、系统和装置 WO2009115029A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200810102129.8 2008-03-18
CN 200810102129 CN101540755B (zh) 2008-03-18 2008-03-18 一种修复数据的方法、系统和装置

Publications (1)

Publication Number Publication Date
WO2009115029A1 true WO2009115029A1 (zh) 2009-09-24

Family

ID=41090502

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/070815 WO2009115029A1 (zh) 2008-03-18 2009-03-16 一种修复数据的方法、系统和装置

Country Status (2)

Country Link
CN (1) CN101540755B (zh)
WO (1) WO2009115029A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111130848A (zh) * 2019-11-29 2020-05-08 中盈优创资讯科技有限公司 身份验证授权统计aaa的故障检测方法及装置
CN113326511A (zh) * 2021-06-25 2021-08-31 深信服科技股份有限公司 一种文件修复方法、系统、设备和介质

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101951607A (zh) * 2010-10-14 2011-01-19 中国电子科技集团公司第三十研究所 一种基于可信度的无线局域网可信接入方法及系统
US9288074B2 (en) 2011-06-30 2016-03-15 International Business Machines Corporation Resource configuration change management
CN102710447B (zh) * 2012-06-12 2015-07-29 深圳市腾讯计算机系统有限公司 终端设备云修复方法和系统
US9246894B2 (en) * 2012-10-30 2016-01-26 Microsoft Technology Licensing, Llc. Communicating state information to legacy clients using legacy protocols
CN110176987B (zh) * 2016-02-02 2022-08-09 斑马智行网络(香港)有限公司 一种设备认证的方法、装置、设备和计算机存储介质
CN106060093B (zh) * 2016-07-29 2019-07-05 上海乐港信息科技有限公司 用于移动设备的云平台开发方法
CN110321141A (zh) * 2019-06-06 2019-10-11 武汉斗鱼鱼乐网络科技有限公司 应用程序native层实时修复方法、设备及系统
CN110727532B (zh) * 2019-09-25 2023-07-28 武汉奥浦信息技术有限公司 一种数据修复方法、电子设备及存储介质
CN112040269B (zh) * 2020-09-08 2023-04-25 平安科技(深圳)有限公司 视频数据展示方法、装置、终端设备及存储介质
CN113329204B (zh) * 2021-08-03 2021-10-01 北京电信易通信息技术股份有限公司 一种基于终端信任管理的数据安全传输方法及系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020026634A1 (en) * 1998-05-18 2002-02-28 Robert Shaw Secure data downloading, recovery and upgrading
CN1406352A (zh) * 2000-02-26 2003-03-26 高等抗病毒研究株式会社 远程修复受损数据和文件的基于互联网的服务系统和方法
US20070143392A1 (en) * 2005-12-15 2007-06-21 Microsoft Corporation Dynamic remediation
CN101077027A (zh) * 2004-11-17 2007-11-21 Lm爱立信电话有限公司 更新移动终端中的配置参数

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020026634A1 (en) * 1998-05-18 2002-02-28 Robert Shaw Secure data downloading, recovery and upgrading
CN1406352A (zh) * 2000-02-26 2003-03-26 高等抗病毒研究株式会社 远程修复受损数据和文件的基于互联网的服务系统和方法
CN101077027A (zh) * 2004-11-17 2007-11-21 Lm爱立信电话有限公司 更新移动终端中的配置参数
US20070143392A1 (en) * 2005-12-15 2007-06-21 Microsoft Corporation Dynamic remediation

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
TCG: "Trusted Network Connect TNC Architecture for interoperability, specification version 1.0, revision 4", TRUSTED COMPUTING GROUP, 3 May 2005 (2005-05-03), US *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111130848A (zh) * 2019-11-29 2020-05-08 中盈优创资讯科技有限公司 身份验证授权统计aaa的故障检测方法及装置
CN111130848B (zh) * 2019-11-29 2022-04-19 中盈优创资讯科技有限公司 身份验证授权统计aaa的故障检测方法及装置
CN113326511A (zh) * 2021-06-25 2021-08-31 深信服科技股份有限公司 一种文件修复方法、系统、设备和介质
CN113326511B (zh) * 2021-06-25 2024-04-09 深信服科技股份有限公司 一种文件修复方法、系统、设备和介质

Also Published As

Publication number Publication date
CN101540755A (zh) 2009-09-23
CN101540755B (zh) 2013-03-13

Similar Documents

Publication Publication Date Title
WO2009115029A1 (zh) 一种修复数据的方法、系统和装置
RU2437228C2 (ru) Система доверительного сетевого подключения для улучшения безопасности
US8468235B2 (en) System for extranet security
JP5396051B2 (ja) 承認済みファイルと信頼されたドメインのデータベースを作成及び更新する方法及びシステム
US20050166041A1 (en) Authentication in a distributed computing environment
US20100077454A1 (en) Trusted network connect method based on tri-element peer authentication
CN105933245B (zh) 一种软件定义网络中安全的可信接入方法
US20140289831A1 (en) Web authentication using client platform root of trust
WO2015196908A1 (zh) 业务处理方法、终端、服务器及系统
JP2005339093A (ja) 認証方法、認証システム、認証代行サーバ、ネットワークアクセス認証サーバ、プログラム、及び記録媒体
KR20060047551A (ko) 네트워크 검역을 제공하기 위한 방법 및 시스템
EP2682892A1 (en) System and method for out-of- band application authentification
US9882965B2 (en) Techniques for network process identity enablement
WO2023065969A1 (zh) 访问控制方法、装置及系统
WO2010118610A1 (zh) 建立三元对等鉴别可信网络连接架构的方法
WO2009109118A1 (zh) 一种终端接入控制方法、网络设备及系统
WO2008034355A1 (fr) Procédé, dispositif et système d'authentification de service réseau
US11706628B2 (en) Network cyber-security platform
CN114826754A (zh) 一种不同网络间的通信方法及系统、存储介质、电子装置
CN113347072A (zh) Vpn资源访问方法、装置、电子设备和介质
CN108200039B (zh) 基于动态创建临时账号密码的无感知认证授权系统和方法
CN112016073A (zh) 一种服务器零信任连接架构的构建方法
US11784993B2 (en) Cross site request forgery (CSRF) protection for web browsers
CN114745145B (zh) 业务数据访问方法、装置和设备及计算机存储介质
Liu et al. A trusted access method in software-defined network

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09722349

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09722349

Country of ref document: EP

Kind code of ref document: A1