WO2010118613A1 - 一种三元对等鉴别可信网络连接架构的实现方法 - Google Patents

一种三元对等鉴别可信网络连接架构的实现方法 Download PDF

Info

Publication number
WO2010118613A1
WO2010118613A1 PCT/CN2009/075697 CN2009075697W WO2010118613A1 WO 2010118613 A1 WO2010118613 A1 WO 2010118613A1 CN 2009075697 W CN2009075697 W CN 2009075697W WO 2010118613 A1 WO2010118613 A1 WO 2010118613A1
Authority
WO
WIPO (PCT)
Prior art keywords
tnc
access
imc
platform
authentication
Prior art date
Application number
PCT/CN2009/075697
Other languages
English (en)
French (fr)
Inventor
肖跃雷
曹军
葛莉
黄振海
Original Assignee
西安西电捷通无线网络通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 西安西电捷通无线网络通信有限公司 filed Critical 西安西电捷通无线网络通信有限公司
Publication of WO2010118613A1 publication Critical patent/WO2010118613A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Definitions

  • the present invention relates to the field of network technologies, and in particular, to a method for implementing a ternary peer-to-peer authentication trusted network connection architecture. Background technique
  • malware such as viruses and worms
  • More than 35,000 malware have emerged, and more than 40 million computers are infected every year.
  • Traditional security defense technologies have been unable to defend against a wide variety of malicious attacks.
  • TCG-TNC Trusted Network Connect
  • TCG-TNC Trusted Network Connect
  • FIG. 1 is a schematic diagram of a TCG-TNC architecture in the prior art, and in FIG. 1, specific vendor integrity Integrity Measurement Collector (IMC) - Integrity Measurement Verifier (IMV) Message Exchange Interface (IF-M) is the integrity collector and integrity checker. Inter-interface, TNC Client-TNC Server Interface (IF-TNCCS) is the interface between the TNC client and the TNC server. Network Authorization Transport Protocol (IF-T) Is the interface between the network access requester and the network access licensor. The Policy Enforcement Point Integrity (IF-PEP) is the interface between the policy enforcement point and the network access licensor, and the integrity metric collector interface.
  • IMC integrity Integrity Measurement Collector
  • IMV Integrity Measurement Verifier
  • IF-M Message Exchange Interface
  • Inter-interface, TNC Client-TNC Server Interface (IF-TNCCS) is the interface between the TNC client and the TNC server.
  • Network Authorization Transport Protocol IF-T
  • the Policy Enforcement Point Integrity
  • IF-IMC Intelligent Measurement Collector Inteface
  • IF-IMV Integrity Measurement Verifier Interface
  • TNC-TNC architecture based on Tri-element Peer Authentication (TePA) was proposed. See Figure 2 for the TePA-based TNC architecture.
  • TePA Tri-element Peer Authentication
  • an Integrity Measurement Interface is an interface between an integrity collector and an integrity checker, and a TNC client.
  • the TNC Client-TNC Access Point Interface is the interface between the TNC client and the TNC access point.
  • the Evaluation Policy Service Interface is the TNC. The interface between the access point and the evaluation policy server.
  • the Trusted Network Transport Interface is the interface between the network access requester and the network access controller.
  • the authentication policy service interface Authentication Policy) Service Interface (IF-APS) is the interface between the network access controller and the authentication policy provider.
  • the Integrity Measurement Collector Interface (IF-IMC) is between the integrity collector and the TNC client. And the interface between the integrity collector and the TNC access point, the integrity metric check interface (Integrity Measurement Verifier Interface, IF-IMV) is the interface between the integrity checker and the evaluation policy server.
  • IF-IMC Integrity Measurement Collector Interface
  • IF-IMV Integrity Measurement Verifier Interface
  • the TCG defines in detail the implementation of each interface in the TCG-TNC architecture: the Remote Authentication Dial In User Service (RADIUS) is defined in the IF-PEP specification. Protocols, etc.; EAP-encapsulated transmission methods in IF-T, etc.; Message transmission protocols and connection management for platform authentication (including platform credential authentication and integrity handshake) are defined in the IF-TNCCS specification, including how to route IMC
  • the message transmitted between the IMV and the IMV; the encapsulation method of the message transmitted between the IMC and the IMV is defined in the IF-M specification, and the IF-M message is defined to describe each attribute of the component and its related processing attributes, such as: Information attributes and security processing attributes, etc.;
  • the function function between the TNC client and the IMC is defined in the IF-IMC specification to support the platform authentication process; the definition between the TNC server and the IMV is defined in the IF-IMV specification.
  • TCG-TNC Trusted Platform Service
  • IF-PTS Trusted Platform Service Interface
  • the PTS is responsible for managing integrity metric logs, creating snapshots and integrity reports, etc., and servicing some of the components of the TCG-TNC architecture through IF-PTS.
  • the IF-PTS is an architecture-independent interface, that is, the IF-PTS can be applied to the TNC architecture shown in Figures 1 and 2.
  • the present invention provides a method for implementing a ternary peer-to-peer authentication trusted network connection architecture, establishing a trusted terminal, implementing a trusted network connection of the terminal, and realizing trust between the terminals. Authenticate and implement trusted management of the terminal.
  • the purpose of the present invention is to define a specific implementation method of each interface in the TePA-based TNC architecture, and then implement a TePA-based TNC architecture based on the specific implementation of the above interface.
  • the technical solution of the present invention is:
  • the present invention provides a method for implementing a ternary peer-to-peer authentication trusted network connection architecture, the method comprising the following steps:
  • Step 1 Establish a ternary peer-to-peer authentication trusted network connection architecture by defining an interface
  • Step 2 Implement a trusted network connection for the ternary peer-to-peer authentication trusted network connection architecture.
  • step 1 specifically includes:
  • Step 11 the specific implementation of the IF-TNT: IF-TNT implements user authentication between the network access requester and the access controller through a user authentication protocol; implements the access requester and the access controller through the network transmission protocol in the TNC process Data transmission; access control between the access requester and the access controller is implemented by an access control protocol;
  • Step 12 Specific implementation of the IF-APS:
  • the IF-APS implements user authentication between the network access requester and the access controller through a user authentication protocol; and implements the access requester and the access controller in the TNC process through a network transmission protocol.
  • Data transmission
  • Step 13 the specific implementation of IF-TNCCAP: IF-TNCCAP implements network connection management between TNC client and TNC access point through network connection management mechanism; realizes between access requester and access controller through platform authentication protocol Platform authentication; management of the platform authentication protocol in the platform authentication process by the platform authentication protocol management mechanism; routing of the integrity measurement layer message by encapsulating the integrity measurement layer message;
  • Step 14 the specific implementation of the IF-EPS: IF-EPS implements platform authentication between the access requester and the access controller through the platform authentication protocol; implements the integrity measurement layer message by encapsulating the integrity measurement layer message Routing; dynamic distribution of assessment policies for access requesters by evaluating policy dynamic distribution mechanisms; Step 15. Specific implementation of the IF-IMC: includes a specific implementation of the IF-IMC in the access requester and a specific implementation of the IF-IMC in the access controller, where the IF-IMC in the access requester and the IF-in the access controller are accessed. The IMC implements an integrity handshake by defining a function function;
  • Step 16 Specific implementation of IF-IMV: IF-IMV implements integrity handshake by defining function functions;
  • Step 17 Implementation of the IF-IM:
  • the IF-IM implements interworking between the IMC and the IMV by utilizing a method of encapsulating the message transmitted between the IMC and the IMV;
  • Step 2 specifically includes:
  • Step 21 The network access requester sends a network access request to the network access controller; Step 22, the network access requester, the network access controller, and the authentication policy server perform
  • IF-TNT and IF-APS User authentication protocol defined in IF-TNT and IF-APS, where user authentication protocol data is transmitted using the network transmission protocol defined in IF-TNT and IF-APS; after the user authentication protocol is completed, if the network access controller requests immediate Making an access decision, the network access controller makes an access decision according to the user authentication result and performs access control using the access control protocol defined in the IF-TNT, otherwise sends a platform authentication request to the TNC access point; if the network access requester requests Immediately making an access decision, the network access requester makes an access decision according to the user authentication result and performs access control using the access control protocol defined in the IF-TNT, otherwise sends a platform authentication request to the TNC client; Step 23, when the TNC is connected When the ingress receives the platform authentication request sent by the network access controller, if the TNC access point requests the evaluation policy provider to evaluate the access requester, the evaluation policy dynamic distribution mechanism defined in the IF-EPS is used to perform the Evaluate policy requests;
  • Step 24 When the TNC access point receives the platform authentication request sent by the network access controller, the TNC access point starts the platform authentication process by using the platform authentication protocol defined in the IF-TNCCAP; when the TNC client receives the network access requester When the platform authentication request is sent, if the TNC access point does not receive the platform authentication request sent by the network access controller, the TNC client initiates the platform authentication process by using the platform authentication protocol defined in the IF-TNCCAP; access requester, access control And the evaluation policy server perform the platform authentication process; Step 25.
  • the IMC in the access requester or the IMC in the access controller utilizes the function function defined in the IF-IMC in the access requester or the IF-IMC in the access controller to the TNC client or TNC.
  • the access point requests to re-execute the platform authentication process, or the evaluation policy changes to require the platform authentication process to be re-executed, and then jumps to step 21, step 22 or step 23 according to the network connection status and the local security policy.
  • the implementation of the user authentication protocol in the foregoing steps 11 and 12 is: if the user authentication has been implemented between the access requester and the access controller, and the security association between the access requester and the access controller is still valid, the network access The requester and the network access controller utilize the security association between the access requester and the access controller to implement user authentication between the access requester and the access controller; otherwise, the network access requester, the network access controller, and the authentication policy service
  • the ternary peer-to-peer authentication protocol is implemented to implement user authentication between the access requestor and the access controller, wherein the authentication policy server acts as a trusted third party role.
  • the network transmission protocol in the foregoing steps 11 and 12 is implemented as follows:
  • the user authentication protocol data and the platform authentication protocol data are encapsulated and transmitted in the same manner as the tunnel EAP encapsulation transmission mechanism, wherein the user authentication protocol data is encapsulated in a package transmission.
  • the platform authentication protocol data is first encapsulated into an encapsulated transport packet and protected by a secure tunnel, and then the secure tunnel protected encapsulated transport packet is nested and packaged in a package transport packet.
  • the network transmission protocol in the foregoing steps 11 and 12 is implemented as follows:
  • the user authentication protocol data and the platform authentication protocol data are encapsulated and transmitted by using mutually independent encapsulation transmission mechanisms, wherein the user authentication protocol data is separately encapsulated in a package transmission package.
  • the platform authentication protocol data is independently encapsulated in a package transport packet and protected with a secure tunnel.
  • the access control protocol in the above step 11 is an access control method based on ternary peer authentication.
  • the implementation of the network connection management mechanism in the above step 13 is: The TNC client locally creates a network connection identifier for each pair of TNC clients, the TNC access point, for identifying each TNC process; the TNC access point is Each pair of TNC clients - the TNC access point locally creates a network connection identifier that identifies each TNC process; in a TNC process, the TNC guest The client, the TNC access point, and the evaluation policy server first perform a platform authentication process.
  • the TNC client, the TNC access point, and the evaluation policy After the server re-executes the platform authentication process, the TNC client and the TNC access point keep the network connection identifier created above unchanged until the TNC process is terminated.
  • the implementation method of the platform authentication protocol in the foregoing steps 13 and 14 is a ternary peer-to-peer authentication protocol executed by the TNC client, the TNC access point, and the evaluation policy server, wherein the TNC client and the TNC access point request each other.
  • the integrity metric of the platform, the TNC client and the TNC access point only verify the platform signature of the integrity metric of the other platform, and the validity verification of the platform identity certificate and the evaluation of the integrity metric are performed by the evaluation policy server. .
  • the implementation method of the platform authentication protocol management mechanism in the above step 13 is: in a platform authentication process, the TNC client, the TNC access point, and the evaluation policy server may perform a multi-round platform authentication protocol, wherein, in each round In the platform authentication protocol, the TNC client and the TNC access point send the integrity metric parameters of the requesting platform to each other, and the integrity metric parameters of the completed metric are sent to the evaluation policy server, after the round platform authentication protocol is completed, The integrity metric of the request metric is not the same as the integrity metric of the completed metric. The TNC client, the TNC access point, and the evaluation policy server perform another round of platform authentication protocol. Otherwise, the platform authentication process is successful. carry out.
  • the encapsulation mechanism for the integrity metric layer message in steps 13 and 14 above is: encapsulation by an encapsulation format consisting of a message type, an integrity collector identifier, and an integrity metric layer message.
  • the evaluation policy dynamic distribution mechanism in the above step 14 is that the TNC access point requests the evaluation policy provider to evaluate the access requester, and the evaluation policy server returns the evaluation policy to the access requester to the TNC access point.
  • the function function to be defined by the IF-IMC in the access requester in the above step 15 is: the TNC client discovers and loads the IMC in the access requester; the TNC client initializes the IMC in the access requester; and accesses the IMC in the requester Reporting the supported message types to the TNC client; the TNC client notifies the network connection status to the IMC in the access requester; the TNC client is in the access requester
  • the IMC announces the integrity metric of the request metric; the IMC in the access requester sends an integrity metric layer message to the TNC client; the IMC in the access requester provides the platform configuration register in the integrity metric to the TNC client (Platform Configuration Register, PCR) reference data, including referenced PCR values and platform signatures for these reference PCR values; the TNC client notifies the IMC in the access requester that the step message of the round platform authentication protocol is to be sent, allowing the access requester The IMC in the stop stops collecting integrity metrics; the TNC client send
  • the function functions defined by the IF-IMC in the access controller in the above step 15 are: TNC access point discovery, loading IMC in the access controller; TNC access point initializing access to the IMC in the controller; accessing the controller
  • the IMC reports the supported message type to the TNC access point;
  • the TNC access point advertises the network connection status to the IMC in the access controller;
  • the TNC access point advertises the integrity metric parameter of the request metric to the IMC in the access controller;
  • the IMC in the access controller sends an integrity metric layer message to the TNC access point;
  • the IMC in the access controller provides the TNC access point with PCR reference data in the integrity metric, including the referenced PCR value and the PCR value for these references Platform signature;
  • the TNC access point informs the IMC in the access controller that the step message of the round platform authentication protocol is to be sent, allowing the IMC in the access controller to stop collecting integrity metrics;
  • the IMC in the middle
  • the function function defined by the IF-IMV in the above step 16 is: the evaluation policy server discovers and loads the IMV in the policy manager; the evaluation policy server initializes the IMV in the policy manager; the IMV to the evaluation strategy in the policy manager The service provider reports the supported message types; the evaluation policy server notifies the IMV in the policy manager of the evaluation policy set by the current platform authentication protocol; the evaluation policy server sends the received completeness to the IMV in the policy manager.
  • the IMV in the Policy Manager sends an integrity metrics layer message to the evaluation policy server; in the Policy Manager
  • the IMV provides the evaluation strategy server with PCR reference data in the integrity metric, including the referenced PCR values and platform signatures for these referenced PCR values; the IMV in the Policy Manager provides component level assessment results to the assessment policy provider; The server terminates the IMV in the Policy Manager.
  • the IF-IM encapsulation method in the above step 17 is: The same as the IF-M encapsulation method in the TCG-TNC architecture.
  • the TNC client when the TNC client receives the platform authentication protocol message defined in the IF-TNCCAP and the IF-EPS, it checks whether the TNC client has loaded and initialized the IMC in the access requester, if the TNC client has not yet Loading and initializing the IMC in the access requester, using the function function defined by the IF-IMC in the access requester to load and initialize the IMC in the access requester; when the TNC access point receives the definition in IF-TNCCAP and IF-EPS
  • the platform When the platform authenticates the protocol message, by checking whether the TNC access point has loaded and initialized the IMC in the access controller, if the TNC access point has not loaded and initialized the IMC in the access controller, the access controller uses the IF- The function function defined by the IMC loads and initializes the IMC in the access controller; when the evaluation policy server receives the platform authentication protocol message defined in IF-TNCCAP and IF-EPS, it checks whether the policy server is loaded and initialized by checking
  • the TNC client, the TNC access point, and the evaluation policy server may perform the platform authentication protocol defined in IF-TNCCAP and IF-EPS, wherein the platform authentication protocol data utilizes the definitions defined in IF-TNT and IF-APS.
  • the network transmission protocol transmits, and the evaluation policy server realizes the distinction by creating a session identifier for each round of platform authentication protocol or each platform authentication process.
  • the TNC client may identify the requester according to the platform; the TNC access point may make an access decision according to the component level evaluation result in each round of platform authentication protocols in the platform authentication process and send the access decision to
  • the network access controller or the evaluation policy server, can make an access decision and send according to the component level evaluation result in each round of the platform authentication protocol in the platform authentication process.
  • the TNC access point is sent to the network access controller; the network access requester and the network access controller perform access control using the access control method defined in the IF-TNT.
  • step 2 for each component in the ternary peer-to-peer authentication trusted network connection architecture, an integrity check is performed when the load or service is enabled to determine that these components are in a trusted state.
  • the present invention can establish a trusted terminal.
  • the integrity collector, the TNC client, and the TNC access point in the access requester in the TeNA-based TNC architecture are implemented by the terminal.
  • the integrity checker and the evaluation policy server in the policy manager may be implemented by the terminal, or may be implemented by a third-party service provider, and then perform a platform authentication process in the TePA-based TNC architecture to establish terminal trust.
  • the present invention can implement a trusted network connection of a terminal.
  • an access requester in a TePA-based TNC architecture is implemented by a terminal accessing the network, and the access controller and the policy are implemented.
  • the manager is implemented by a network service provider, wherein some or all functions of the policy manager can also be implemented by a third-party service provider, and then the TNC process in the TePA-based TNC architecture is implemented to implement the trusted network connection of the terminal. .
  • the present invention can implement trusted authentication between terminals.
  • the access requester in the TPA-based TNC architecture is implemented by one terminal, and the access controller is implemented by another terminal.
  • the policy manager may be implemented by a network service provider, wherein some or all functions of the policy manager may also be implemented by a third-party service provider. If the user has completed the user authentication and generated the session key, the execution is based on The platform authentication process in the TNC architecture of TePA implements trusted authentication between terminals. Otherwise, the TNC process in the TePA-based TNC architecture is implemented to implement trusted authentication between terminals.
  • the present invention can implement trusted management of a terminal.
  • the access requester in the TPA-based TNC architecture is implemented by the terminal, and the access controller and the policy manager are configured by the network.
  • the service provider implements, wherein some or all of the functions of the policy manager can also be implemented by a third-party service provider, if the user has completed the user between the terminal and the network service provider.
  • the platform authentication process in the TePA-based TNC architecture is implemented to implement trusted management of the terminal. Otherwise, the TNC process in the TePA-based TNC architecture is implemented to implement trusted management of the terminal.
  • the invention can be widely applied.
  • the platform identification process in the specific implementation of the TPA architecture based on the TePA of the present invention can be completed by using a round of platform authentication protocol, or can be completed by using multiple rounds of platform authentication protocols to meet the requirements of different network devices. .
  • the present invention is advantageous for independent implementation.
  • the policy manager does not participate in network connection management, and is an independent role, which is beneficial to independent implementation, so that the policy manager can be completely Trusted third party to achieve;
  • FIG. 1 is a schematic diagram of a TCG-TNC architecture in the prior art
  • FIG. 2 is a schematic diagram of a TPA architecture based on TePA in the prior art
  • FIG. 3 is a schematic diagram of interaction of an IF-IMC in an access requester according to the present invention.
  • FIG. 4 is a schematic diagram of interaction of an IF-IMC in an access controller according to the present invention.
  • FIG. 5 is a schematic diagram of interaction of an IF-IMV in a policy manager of the present invention. detailed description
  • the present invention provides a method for implementing a ternary peer-to-peer authentication trusted network connection architecture, the method comprising the following steps:
  • Step 1 Establish a ternary peer-to-peer authentication trusted network connection architecture by defining an interface
  • Step 2 Implement a trusted network connection for the ternary peer-to-peer authentication trusted network connection architecture.
  • step 1 specifically includes:
  • Step 11 Specific implementation methods of IF-TNT and IF-APS:
  • the user authentication protocol defined in IF-TNT and IF-APS can use a ternary peer-to-peer authentication protocol based on symmetric key and asymmetric key, such as: WAI protocol in China's wireless LAN standard.
  • the network transmission protocol defined in the IF-TNT and the IF-APS may be:
  • the protocol data encapsulation packet may use the same or similar protocol data encapsulation packet as the EAP, but the processing of the protocol data encapsulation packet is different from the EAP, and the protocol data is different.
  • the encapsulation packet is parsed at the access controller and then encapsulated into another protocol data encapsulation packet and sent to the other party, unlike EAP, which is a point-to-point protocol encapsulation and parsing packet processing process, but a three-party protocol.
  • Tri-element Authentication Extensible Protocol TAEP
  • user authentication protocol data and platform authentication protocol data can be used with ramp EAP
  • a similar encapsulation method can be encapsulated, and can also be encapsulated by independent encapsulation methods.
  • the access requester and the access controller will receive a successful type of protocol data encapsulation package, such as: TAEP-success package, and Corresponding to the entire TNC process, for the latter, access requester and access control You will receive two types of successful encapsulation packet data protocol, such as: TAEP-success encapsulated packet, respectively, and the user authentication process, the authentication process corresponding to the internet.
  • the access control protocols defined in IF-TNT and IF-APS can use access control methods based on ternary peer authentication, such as the access control methods used in the Chinese wireless local area standard.
  • Step 12 Specific implementation methods of IF-TNCCAP and IF-EPS:
  • the network connection management mechanism defined in IF-TNCCAP can be: TNC client locally generates network connection identifier with TNC access point, TNC access point local generation and The network connection identifier of the TNC client, the network connection identifier is represented by ConnectionID; the TNC client and the TNC access point set some for each ConnectionID.
  • Network connection status such as: create, integrity handshake, allow, disable, quarantine, and terminate connections.
  • the TNC client, the TNC access point, and the evaluation policy server first perform a platform authentication process.
  • the TNC client, The TNC access point and the evaluation policy server need to re-execute the platform authentication process.
  • the TNC client and the TNC access point keep the ConnectionID created above unchanged, but the network connection status can be set to a different state until the TNC process is terminated.
  • the platform authentication protocol management mechanism defined in IF-TNCCAP may be: In a platform authentication process, the TNC client, the TNC access point, and the evaluation policy server may need to implement multiple rounds of platform authentication protocols, where, in each round of platforms In the authentication protocol, the TNC client and the TNC access point send each other the integrity metric parameter of the requesting platform, and the evaluation metric server sends the integrity metric parameter of the completed metric. After the round platform authentication protocol is completed, if the request is The metric integrity metric is not the same as the integrity metric of the completed metric. The TNC client, TNC access point, and evaluation policy server need to perform another round of platform authentication protocol. Otherwise, the platform authentication process has been successfully completed. .
  • the evaluation policy dynamic distribution mechanism defined in IF-EPS can be:
  • the evaluation policy server sets a corresponding evaluation policy for each level of users and each level of service, and the TNC access point can access the requester's user identity or access request.
  • the service requested by the user, or the user identity of the access requester and the requested service are sent to the evaluation policy server, and then the evaluation policy server returns an evaluation policy to the access requester to the TNC access point according to the local settings.
  • the encapsulation mechanism for the integrity metric layer message defined in IF-TNCCAP and IF-EPS may be a list of (message type + integrity collector ID + integrity metric layer message table), which may be composed of a component type and a vendor identifier. :
  • the platform authentication protocol defined in IF-TNCCAP and IF-APS is accessed by the TNC client and TNC.
  • Point and evaluation ternary peer-to-peer authentication protocol performed by the policy server, where the TNC client and the TNC access point request each other's integrity metrics, and the TNC client and the TNC access point only verify the integrity metric of the other platform.
  • the platform signature of the value, and the validity verification of the platform identity certificate and the evaluation of the integrity metric are performed by the evaluation policy server.
  • Step 13 The specific implementation method of IF-IMC in the access requester:
  • the function function of the IF-IMC in the access requester is:
  • Step 131 Discover and load a function of the IMC in the access requester, which is related to a specific platform and can be implemented by using different methods;
  • Step 132 TNC_IMC_ Initialize ⁇ imcID , min Version , max Version , *pOutActualVersion ⁇ , used to initialize the IMC, implemented by the IMC in the access requester, where imcID is the integrity collector assigned by the TNC client to the IMC.
  • imcID is the integrity collector assigned by the TNC client to the IMC.
  • the identifier, min Version and max Version are the version number of the application interface function supported by the TNC client, and *pOutActualVersion is the version number of the application interface function actually used;
  • Step 133 The TNC TNCC ReportMessageTypes ⁇ imcID , supportedTypes , typeCount ) is used by the IMC in the access requester to advertise the supported message type to the TNC client, which is implemented by the TNC client, where the supportedTypes are the messages supported by the access requester.
  • Type, typeCount is the number of message types supported by the access requester;
  • Step 134 The TNC IMC NotifyConnectionChange ⁇ imcID , connectionID , newState ⁇ is used by the TNC client to notify the IMC of the access requester of the network connection status, which is implemented by the IMC, where the connectionID is the network connection identifier created by the TNC client, and the newState is the network. Connection Status;
  • Step 135 TNC IMC RequestMeasurementInfo ⁇ imcID, connectionID, MeasurementInfo ⁇ , the integrity metric parameter used by the TNC client to notify the IMC of the request metric in the access requester, implemented by the IMC, where MeasurementInfo is the integrity metric parameter of the request metric;
  • Step 136 TNC - TNCC - SendMessage ⁇ imcID , connectionID , messgae , messageLength , messageType ⁇ , the IMC used to access the requester sends an integrity metric layer message to the TNC client, which is implemented by the TNC client, where messgae is integrity Metric layer message, The messageLength is the length of the message, and the messageType is the message type of the message;
  • Step 137, TNC TNCC ProvidePCRsIndex ⁇ imcID , connectionID , PCRsIndex ) the IMC used to access the requester provides the PCR reference data in the integrity metric to the TNC client ( Known by the Trusted Platform Evaluation Layer component, implemented by the TNC client, where PCRsIndex is the PCR reference data in the integrity metric;
  • Step 138 TNC IMC PAIEnding ⁇ imcID, connectionID ⁇ is used for the TNC client to notify the IMC in the access requester that the step message of the round platform authentication protocol is to be sent, so that the IMC in the access requester stops collecting integrity metrics. , implemented by IMC;
  • Step 139 TNC IMC ReceiveMessage ⁇ imcID , connectionID , messgae , messageLength , messageType ⁇ , used by the TNC client to send the received integrity metric layer message to the IMC in the access requester, implemented by the IMC;
  • Step 1310 TNC—IMC— Terminate ⁇ imcID ⁇ , used by the IMC to terminate the access IMC of the TNC client, implemented by the IMC;
  • Step 1311 TNC TNCC RequestHandshakeRetry ⁇ imcID, connectionID, reason ⁇ , the IMC used to access the requester requests the TNC client to re-execute the integrity handshake, which is implemented by the TNC client, where reason is the reason for requesting the re-execution of the integrity handshake .
  • FIG. 3 is a schematic diagram of interaction of an IF-IMC in an access requester according to the present invention.
  • an interaction diagram of an IF-IMC in an access requester is shown in FIG. 3.
  • the dotted line function function call arrow in the IF-IMC indicates optional, and the solid line function function call arrow indicates that it is necessary, and the platform authentication protocol in the integrity handshake process can be any round (not limited to 2 rounds), until an access decision is made, and both the access requester and the access controller can initiate a platform authentication protocol.
  • Step 14 Access to the IF-IMC in the controller
  • the function functions of the IF-IMC in the access controller are:
  • Step 141 Discover and load a function of the IMC in the access controller, which is related to a specific platform and can be implemented by using different methods;
  • Step 142 TNC_IMC_Firstize ⁇ imcID , min Version , max Version , *pOutActualVersion ⁇ , used to initialize the IMC, implemented by the IMC in the access controller, where imcID is the integrity collector identifier assigned by the TNC access point to the IMC, min Version and max Version are the application interface function version numbers supported by the TNC access point, and *pOutActualVersion is the version number of the application interface function actually used;
  • Step 143 The TNC TNCAP ReportMessageTypes ⁇ imcID, supportedTypes , typeCount ) is used by the IMC in the access controller to notify the TNC access point of the supported message type, which is implemented by the TNC access point, where the supportedTypes are supported by the access controller.
  • typeCount is the number of message types supported by the access controller;
  • Step 144 TNC IMC NotifyConnectionChange ⁇ imcID , connectionlD , newState ⁇ is used by the TNC access point to notify the IMC in the access controller of the network connection status, which is implemented by the IMC, where connectionlD is the network connection identifier created by the TNC access point, newState For the network connection status;
  • Step 145 TNC IMC RequestMeasurementInfo ⁇ imcID, connectionlD, MeasurementInfo ⁇ , the integrity metric parameter used by the TNC access point to notify the IMC in the access controller of the request metric, implemented by the IMC, where Measurementlnfo is the integrity metric parameter of the request metric ;
  • Step 146 TNC TNCAP SendMessage ⁇ imcID, connectionlD, messgae, messageLength, messageType ⁇ , the IMC used in the access controller sends an integrity metric layer message to the TNC access point, which is implemented by the TNC access point, where messgae is integrity Metric layer message, messageLength is the length of message, messageType is the message type of message;
  • Step 147 TNC TNCAP ProvidePCRsIndex ⁇ imcID , connectionlD ,
  • PCRsIndex the IMC used in the access controller provides the PCR reference data in the integrity metric to the TNC access point (known to the trusted platform evaluation layer component), implemented by the TNC access point, where PCRsIndex is the integrity metric PCR reference data in the value;
  • Step 148 The TNC IMC PAIEnding ⁇ imcID, connectionlD ⁇ is used by the TNC access point to notify the IMC in the access controller that the step message of the round platform authentication protocol is to be sent, so that the IMC in the access controller stops collecting the integrity metric. Value, implemented by IMC; Step 149, TNC IMC ReceiveMessage ⁇ imcID , connectionID , messgae , messageLength , messageType ⁇ , used by the TNC access point to send the received integrity metric layer message to the IMC in the access controller, implemented by the IMC;
  • Step 1410 TNC_IMC_ Terminate ⁇ imcID ⁇ , used by the TNC to terminate the access to the IMC in the controller, implemented by the IMC;
  • Step 1411 TNC TNCAP RequestHandshakeRetry ⁇ imcID , connectionID , reason ⁇ , the IMC used in the access controller requests the TNC access point to re-execute the integrity handshake, which is implemented by the TNC access point, where reason is to perform the integrity handshake again. s reason.
  • FIG. 4 is a schematic diagram of interaction of an IF-IMC in an access controller according to the present invention.
  • the platform authentication process an interaction diagram of an IF-IMC in a controller is accessed, as shown in FIG. 4.
  • the dotted line function function call arrow in the IF-IMC indicates optional, and the solid line function function call arrow indicates that it is necessary, and the platform authentication protocol in the integrity handshake process can be any round (not limited to 2 rounds), until an access decision is made, and both the access requester and the access controller can initiate a platform authentication protocol.
  • Step 15 The specific implementation method of IF-IMV:
  • Step 151 Discover and load the function function of the IMV in the Policy Manager, which is related to a specific platform and can be implemented by using different methods;
  • Step 152 TNC_IMV_Firstize ⁇ imvID , min Version , max Version , *pOutActualVersion ⁇ , used to evaluate the IMV in the policy server initialization policy manager, implemented by the IMV in the policy manager, where the imvID is the evaluation policy service
  • the integrity checker identifier assigned to the IMV in the policy manager, min Version and maxVersion are the application interface function version numbers supported by the evaluation policy server, and *pOutActual Version is the actual version of the application interface function version used;
  • Step 153 TNC EPS ReportMessageTypes ⁇ imvID , supportedTypes , typeCount ) , used by the IMV in the policy manager to notify the evaluation policy server of the supported message types, implemented by the evaluation policy server, where supportedTypes is the IMV in the policy manager Place
  • the supported message types, typeCount is the number of message types supported by the IMV in the Policy Manager;
  • Step 154 TNC IMV SetAttributePolicy ⁇ imvID , PAIBindingID , AttributePolicy ⁇ is used to evaluate the evaluation policy set by the policy server to notify the IMV in the policy manager of the current round platform authentication protocol, which is implemented by the IMV in the policy manager, where PAIBindingID is a platform authentication protocol created for the evaluation policy server for this round of platform authentication protocol.
  • PAIBindingID is a platform authentication protocol created for the evaluation policy server for this round of platform authentication protocol.
  • the NAC-PM and the access requester's platform authentication request challenge the NAR jointly derived a random Number, AttributePolic is the evaluation strategy set by the pass;
  • Step 155 TNC IMV ReceiveMessage ⁇ imvID, PAIBindingID, messgae, messageLength, messageType ⁇ is used to evaluate the policy server to send the received integrity metric layer message to the IMV in the policy manager, which is implemented by the IMV in the policy manager.
  • messgae is the integrity metric layer message
  • messageLength is the length of the message
  • messageType is the message type of the message
  • Step 156 TNC-EPS—SendMessage ⁇ imvID, PAIBindingID, messgae, messageLength, messageType ⁇ , for the IMV in the policy manager to send an integrity metric layer message to the evaluation policy server, which is implemented by the evaluation policy server;
  • Step 157 TNC EPS ProvideRecommendation ⁇ imvID , PAIBindingID , recommendation, evaluation ⁇ , the IMV used in the policy manager provides the component level evaluation result to the evaluation policy server (the trusted platform evaluation layer component is known), and the evaluation policy server Realize, evaluate the results of the assessment;
  • Step 158 TNC EPS ProvidePCRsIndex ⁇ imvID, PAIBindingID, PCRsIndex), the IMV used in the policy manager provides the PCR reference data in the integrity metric to the evaluation policy server (known by the trusted platform evaluation layer component), by the evaluation Strategy server implementation, Where PCRsIndex is the PCR reference data in the integrity metric;
  • Step 159 TNC-IMV_ Terminate ⁇ imvID ⁇ , the IMV in the Policy Manager for evaluating the termination of the policy server, implemented by the IMV in the Policy Manager;
  • FIG. 5 is a schematic diagram of interaction of an IF-IMV in a policy manager of the present invention.
  • an interaction diagram of an IF-IMV in a policy manager is shown in FIG. 5.
  • the dotted line function function call arrow in the IF-IMV indicates optional, and the solid line function function call arrow indicates that it is necessary, and the platform authentication protocol in the integrity handshake process can be any round (not limited to 2 rounds), until an access decision is made, and both the access requester and the access controller can initiate a platform authentication protocol.
  • Step 16 The specific implementation method of IF-IM:
  • TNC-IMC-RequestMeasurementInfo to complete the request integrity metrics attribute function in the TCG-TNC architecture (using the integrity metric layer message to complete, ie using IF-M messages), other and TCG-TNC architectures
  • the IF-M is the same.
  • Step 2 Implement a ternary peer-to-peer authentication trusted network connection architecture trusted network connection, the specific steps are:
  • Step 21 The network access requester sends a network access request to the network access controller.
  • Step 22 The network access requester, the network access controller, and the authentication policy server perform a user authentication protocol, such as: a WAI protocol in the Chinese wireless local area network standard, where The user authentication protocol data is encapsulated and transmitted using the TAEP packet.
  • a WAI protocol in the Chinese wireless local area network standard
  • the network access controller After the user authentication protocol is completed, if the network access controller requests an access decision immediately, the network access controller makes an access decision based on the user authentication result and uses an access control method based on ternary authentication (eg: China wireless local area network standard)
  • the access control method used in the middle performs access control, otherwise sends a platform authentication request to the TNC access point; if the network access requester requests an access decision immediately, the network access requester makes an access decision according to the user authentication result and
  • the access control method is performed by an access control method based on ternary authentication (such as the access control method used in the Chinese wireless local area network standard), otherwise the platform authentication request is sent to the TNC client.
  • the PTS in the access controller can scan the file code and memory code of the TNC access point to ensure its reliability. Loading TNC passengers
  • the PTS in the access requester can scan the TNC client's file code and memory code to ensure its trustworthiness.
  • Step 23 When the TNC access point receives the platform authentication request sent by the network access controller, if the TNC access point requests the evaluation policy provider to evaluate the access requestor, the user level based on the access requester is The service level requested by the access requester sends an evaluation policy request to the evaluation policy server, and then the evaluation policy server delivers the corresponding evaluation policy.
  • the PTS in the policy manager can scan the evaluation policy server's file code and memory code to ensure its trustworthiness.
  • the TNC access point can use the IF-PTS in the access controller to request the PTS to scan the network access controller's file code and memory code to ensure its trustworthiness.
  • the evaluation policy server can use the IF-PTS request in the Policy Manager to scan the file code and memory code of the authentication policy server to ensure its trustworthiness.
  • Step 241 When the TNC access point receives the platform authentication request sent by the network access controller, or when performing another round of platform authentication protocol, the TNC access point starts the platform authentication process, and constructs a message 1 in the platform authentication protocol. To the TNC client;
  • Step 242 If the message 1 in the platform authentication protocol received by the TNC client is the first round platform authentication protocol message (if the TNC client has not loaded and initialized the IMC in the access requester at this time, the IMC in the access requester is utilized.
  • the platform binding method, TNC-IMC-Initialize and TNC-TNCC-ReportMessageTypes to implement the loading and initialization of the IMC in the access requester) the TNC client creates the ConnectionID locally, and can call the TNC-IMC-NotifyConnectionChange to the access requester.
  • the IMC advertises that the network connection status is CREATE, and then can call TNC_IMC_NotifyConnectionChange to notify the IMC in the access requester that the network connection status is HANDSHAKE, indicating the integrity between the IMC in the access requester and the IMV in the Policy Manager.
  • the handshake process begins, and then the TNC-IMC-RequestMeasurementlnfo is called to notify the IMC in the access requester of the completion of the request metric.
  • Integrity metric parameter otherwise directly call TNC-IMC-RequestMeasurementInfo to notify the IMC of the access requester of the integrity metric parameter of the request metric, and the IMC in the access requester receives the integrity metric parameter of the request metric and then uses the access requester.
  • the IF-PTS requests the PTS to perform metrics and generate integrity metrics for the access requester;
  • Step 243 The IMC in the access requester invokes the TNC-TNCC-SendMessage to send the integrity metric of the access requester to the TNC client, and can also call the TNC-TNCC-Provide PCRsIndex to provide the Trusted Platform Evaluation Layer component to the TNC client.
  • PCR reference data
  • Step 244 When the step message of the round platform authentication protocol is to be sent, the TNC client first invokes the TNC-IMC-PAIEnding to notify the IMC in the access requester to stop the IMC in the access requester from collecting the integrity metric value;
  • Step 245 When the TNC client receives the message 1 in the platform authentication protocol sent by the TNC access point, that is, when the step 241 to the step 244 exist, the TNC client constructs the message 2 in the platform authentication protocol and sends the message 2 to the TNC access point.
  • the TNC client does not receive the message 1 in the platform authentication protocol sent by the TNC access point, that is, when steps 241 to 244 do not exist, if the TNC client receives the platform authentication request sent by the network access requester, or performs Another round of platform authentication protocol, the TNC client initiates the platform authentication process, and constructs a message 2 in the platform authentication protocol to send to the TNC access point;
  • Step 246 If the message 2 in the platform authentication protocol received by the TNC access point is the first round platform authentication protocol message (if the TNC access point has not loaded and initialized the IMC in the access controller at this time, the access controller is used.
  • the IMC platform binding method, TNC-IMC-Initialize and TNC-TNCAP-ReportMessageTypes to implement the loading and initialization of the IMC in the access controller) the TNC access point locally creates the ConnectionID, and can call the TNC-IMC_NotifyConnectionChange to access
  • the IMC in the controller advertises that the network connection status is CREATE, and then can call TNC_IMC_NotifyConnectionChange to notify the IMC in the access controller that the network connection status is HANDSHAKE, indicating that the IMC in the access controller is in communication with the IMV in the Policy Manager.
  • the integrity of the handshake process begins, then calls TNC - IMC - RequestMeasurementlnfo informs the IMC in the access controller of the integrity metric of the request metric, otherwise directly calls the TNC-IMC_RequestMeasurementInfo to notify the IMC in the access controller of the integrity metric of the request metric, accessing the controller
  • the IMC requests the PTS to perform the metric by using the IF-PTS in the access controller, and generates an integrity metric for the access controller;
  • Step 247 The IMC in the access controller invokes the TNC - TNCAP - SendMessage sends the integrity metric to the access controller to the TNC access point, and can also call the TNC - TNCAP - ProvidePCRsIndex to provide the trusted platform evaluation layer to the TNC access point.
  • PCR reference data known to the component;
  • Step 248 When the step message of the round platform authentication protocol is to be sent, the TNC access point first calls the TNC-IMC-PAIEnding to notify the IMC in the access controller to stop the IMC in the access controller from collecting the integrity metric value;
  • Step 249 The TNC access point constructs a message in the platform authentication protocol and sends it to the evaluation policy server.
  • Step 2410 After receiving the message 3 in the platform authentication protocol sent by the TNC access point, the evaluation policy server first calls the TNC-IMV-SetAttributePolicy to notify the IMV in the policy manager of the evaluation strategy set by the current platform authentication protocol. And then call TNC-IMV-ReceiveMessage to send the received integrity metric layer message to the IMV in the Policy Manager;
  • Step 2411 After receiving the message sent in step 2410, the IMV in the policy manager sends the message to the PTS connected to the IMV in the policy manager. If the PTS parses the information, an error message is generated. Sent to the IMV in the Policy Manager, otherwise the PTS parses these messages and generates component-level evaluation results and platform patching information with the assistance of a background (the TCG-TNC architecture defined) referential integrity inventory database;
  • Step 2412 The IMV in the Policy Manager invokes the TNC-EPS-SendMessage to send the integrity metric layer message generated in step 2411 to the evaluation policy server.
  • Step 2413 the IMV in the Policy Manager can call TNC—EPS— ProvideRecommendation Providing component-level evaluation results to the evaluation policy server (known to the trusted platform evaluation layer component);
  • Step 2414 the IMV in the Policy Manager can invoke the TNC-EPS-ProvidePCRsIndex to provide the evaluation strategy server with the PCR in the integrity metric Reference data (awareness of the Trusted Platform Evaluation Layer component);
  • Step 2415 The evaluation policy server constructs a message 4 in the platform authentication protocol and sends the message to the TNC access point.
  • Step 2416 After receiving the message 4 in the platform authentication protocol sent by the evaluation policy server, the TNC access point first calls the TNC-IMC-ReceiveMessage to send the received integrity metric layer message to the IMC in the access controller.
  • the evaluation of the access requester is completed, and the access decision of the access controller is generated according to the component-level evaluation result of the integrity metric of the access requester, otherwise it indicates that the TNC access point performs another round of platform authentication protocol, namely: After the round of the platform authentication protocol, the process starts again from step 241, and then the message 5 in the TNC access point construction platform authentication protocol is sent to the TNC client;
  • Step 2417 After receiving the message 5 in the platform authentication protocol sent in step 2416, the TNC client first calls the TNC_IMC_ReceiveMessage to send the received integrity metric layer message to the IMC in the access requester, if received. Accessing the controller's access decision (indicating that the platform authentication for the access requester has been completed), then the TNC-IMC_NotifyConnectionChange can be invoked to notify the IMC in the access requester of the access decision of the access controller (ie, the network connection status), if The evaluation of the access controller is completed, and the access requester's access decision is generated based on the component-level evaluation result of the integrity metric of the access controller, otherwise the TNC client performs another round of platform authentication protocol, ie: After the round platform authentication protocol ends, the process starts again from step 245, and then the message 6 in the TNC client constructs the platform authentication protocol is sent to the TNC access point;
  • Step 2418 After receiving the message 6 in the platform authentication protocol sent in step 2417, the TNC access point may invoke TNC_IMC_NotifyConnectionChange to notify the IMC in the access controller of the access request of the access requester (that is, the network connection status). ).
  • Step 25 After the platform patching is completed, accessing the IMC call in the requester TNC—TNCC—RequestHandshakeRetry requests the TNC client to re-execute the integrity handshake.
  • the IMC in the access controller calls the TNC-TNCAP—RequestHandshakeRetry to request the TNC access point to re-execute the integrity handshake, or the evaluation policy has changed, thereby re-
  • the process proceeds to step 21, step 22 or step 24 according to the network connection status and the local security policy.
  • step 24 describes a complete platform authentication process, where the platform authentication protocol may be the platform authentication protocol in the specific implementation methods of the IF-TNCCAP and IF-PTS described above, and if applied to the one-way platform authentication, Use some sub-steps in step 24 to achieve.
  • the platform authentication protocol may be the platform authentication protocol in the specific implementation methods of the IF-TNCCAP and IF-PTS described above, and if applied to the one-way platform authentication, Use some sub-steps in step 24 to achieve.
  • the PTS in the access requester can scan the TNC client when the TNC client is loaded, or the service of the TNC client is started.
  • the file code and memory code of the terminal when the TNC access point is loaded, or the service of the TNC access point is started, the PTS in the access controller can scan the file code and the memory code of the TNC access point, and load the evaluation policy server, Or when the evaluation policy server's service is started, the PTS in the Policy Manager can scan the file code and memory code of the evaluation policy server.
  • the TNC client can use the IF-PTS in the access requester to request the PTS in the access requester to scan the file code and memory code of the IMC in the access requester, load the IMC in the access controller, or access
  • the TNC access point can use the IF-PTS in the access controller to request the PTS in the access controller to scan the file code and memory code of the IMC in the access controller, in the load policy management.
  • the evaluation policy server can use the IF-PTS in the Policy Manager to request the PIV in the Policy Manager to scan the file code of the IMV in the Policy Manager and Memory code.
  • the service of the network access requester or the network access requester is started.
  • the TNC client can use the IF-PTS in the access requester to request the PTS request in the access requester to scan the network access requester's file code and memory code, load the network access controller, or the network access controller's service.
  • the TNC access point can use the IF-PTS in the access controller to request the PTS in the access controller to scan the network access controller's file code and memory code, load the authentication policy server, or authenticate the policy server.
  • the evaluation policy server can use the IF-PTS in the policy manager to request the PTS request in the policy manager to scan the file code and the memory code of the authentication policy server.

Description

一种三元对等鉴别可信网络连接架构的实现方法
技术领域
本发明涉及网络技术领域, 尤其涉及一种三元对等鉴别可信网络连接架 构的实现方法。 背景技术
随着信息化的发展, 病毒、 蠕虫等恶意软件的问题异常突出。 目前已经 出现了超过三万五千种的恶意软件, 每年都有超过四千万的计算机被感染。 要遏制住这类攻击, 不仅通过解决安全的传输和数据输入时的检查, 还要从 源头即从每一台连接到网络的终端开始防御。 而传统的安全防御技术已经无 法防御种类繁多的恶意攻击。
国际可信计算组织(Trusted Computing Group, TCG )针对这个问题, 专 门制定了一个基于可信计算技术的网络连接规范——可信网络连接 ( Trusted Network Connect, TNC ) , 简记为 TCG-TNC, 其包括了开放的终端完整性架 构和一套确保安全互操作的标准。这套标准可以在用户通过时保护一个网络, 且由用户自定义保护到什么程度。 TCG-TNC本质上就是要从终端的完整性开 始建立连接。 首先, 要创建一套在可信网络内部系统运行状况的策略。 只有 遵守网络设定策略的终端才能访问网络, 网络将隔离和定位那些不遵守策略 的设备。 由于使用了可信平台模块(Trusted Platform Module, TPM ) , 所以 还可以阻挡 root kits的攻击。 root kits是一种攻击脚本、 经修改的系统程序, 或者成套攻击脚本和工具, 用于在一个目标系统中非法获取系统的最高控制 权限。 TCG-TNC架构参见图 1。
图 1为现有技术中 TCG-TNC架构示意图, 在图 1中, 特定厂家完整性 收集者 ( Integrity Measurement Collector, IMC ) -完整性校验者 ( Integrity Measurement Verifier , IMV ) 消息交换接口 ( Vendor- Specific IMC-IMV Messages, IF-M )是完整性收集者和完整性校验者之间的接口, TNC客户端 - TNC服务端接口 (TNC Client-TNC Server Interface, IF-TNCCS )是 TNC 客户端和 TNC服务端之间的接口, 网络授权传输协议( Network Authorization Transport Protocol, IF-T )是网络访问请求者和网络访问授权者之间的接口, 策略执行点接口 ( Policy Enforcement Point Integrity, IF-PEP )是策略执行点 和网络访问授权者之间的接口,完整性度量收集者接口( Integrity Measurement Collector Inteface, IF-IMC )是完整性收集者和 TNC客户端之间的接口, 完 整性度量校马全接口 (Integrity Measurement Verifier Interface, IF-IMV )是完整 性校验者和 TNC服务端之间的接口。
但是, 由于图 1所示的 TCG-TNC架构中访问请求者不评估策略执行点 的完整性, 所以该架构存在策略执行点不可信赖的问题。 为了解决这一问题, 一种基于三元对等鉴别 (Tri-element Peer Authentication, TePA ) 的 TNC架 构被提出。 基于 TePA的 TNC架构参见图 2。
图 2为现有技术中基于 TePA的 TNC架构示意图, 在图 2中, 完整性度 量接口 ( Integrity Measurement Interface, IF-IM )是完整性收集者和完整性校 验者之间的接口, TNC客户端 - TNC接入点接口 ( TNC Client-TNC Access Point Interface, IF-TNCCAP )是 TNC客户端和 TNC接入点之间的接口, 评 估策略服务接口 ( Evaluation Policy Service Interface, IF-EPS )是 TNC接入点 和评估策略服务者之间的接口,可信网络传输接口( Trusted Network Transport Interface , IF-TNT )是网络访问请求者和网络访问控制者之间的接口, 鉴别 策略服务接口 (Authentication Policy Service Interface, IF-APS )是网络访问 控制者和鉴别策略服务者之间的接口, 完整性度量收集者接口 (Integrity Measurement Collector Interface, IF-IMC )是完整性收集者和 TNC客户端之 间, 以及完整性收集者和 TNC 接入点之间的接口, 完整性度量校验接口 ( Integrity Measurement Verifier Interface, IF-IMV )是完整性校验者和评估策 略服务者之间的接口。
为了具体实现图 1所示的 TCG-TNC架构, TCG详细定义了 TCG-TNC 架构中各个接口的具体实现方法:在 IF-PEP规范中定义远程用户拨号认证系 统(Remote Authentication Dial In User Service, RADIUS )协议等; 在 IF-T 的遂道 EAP封装传输方法等; 在 IF-TNCCS规范中定义了平台鉴别 (包括平 台凭证鉴别和完整性握手)的消息传输协议和连接管理等,包括如何路由 IMC 和 IMV之间传输的消息; 在 IF-M规范中定义了 IMC和 IMV之间所传输消 息的封装方法等,包括定义 IF-M消息来描述组件的各个属性及其相关处理属 性, 如: 产品信息属性和安全处理属性等; 在 IF-IMC规范中定义了 TNC客 户端和 IMC之间的功能函数, 用于支持平台鉴别过程; 在 IF-IMV规范中定 义了 TNC服务端和 IMV之间的功能函数, 也是用于支持平台鉴别过程。 此 夕卜, 在 TNC过程中 TCG-TNC架构的一些组件还可能通过可信平台服务接口 ( Trusted Platform Service Interface , IF-PTS )与可信平台服务( Trusted Platform Service, PTS )进行通信。 PTS负责管理完整性度量日志、 创建快照和完整性 报告等, 并通过 IF-PTS为 TCG-TNC架构的一些组件提供服务。 IF-PTS是一 个与架构类型无关的接口, 即该 IF-PTS可适用于图 1和图 2所示的 TNC架 构。
同理, 为了具体实现图 2所示的基于 TePA的 TNC架构, 需要通过详 细定义基于 TePA的 TNC架构中各个接口的具体实现方法,然后基于上述 接口的具体实现来实现基于 TePA的 TNC架构。但是, 由于图 2所示的基 于 TePA的 TNC架构与图 1所示的 TCG-TNC架构存在着较大的差异性, 所以基于 TePA的 TNC架构的具体实现方法也不同。 发明内容 为了解决背景技术中存在的上述技术问题, 本发明提供了一种三元对等 鉴别可信网络连接架构的实现方法, 建立终端可信、 实现终端的可信网络连 接、 实现终端间的可信认证和实现对终端的可信管理。 本发明的目的就是详 细定义基于 TePA的 TNC架构中各个接口的具体实现方法, 然后基于上述接 口的具体实现来实现基于 TePA的 TNC架构。
本发明的技术解决方案是: 本发明提供了一种三元对等鉴别可信网络连 接架构的实现方法, 该方法包括以下步骤:
步骤 1、 通过定义接口建立三元对等鉴别可信网络连接架构;
步骤 2、 实现三元对等鉴别可信网络连接架构的可信网络连接。
其中, 步骤 1具体包括:
步骤 11、 IF-TNT的具体实现: IF-TNT通过用户鉴别协议来实现网络访 问请求者和访问控制器之间的用户鉴别; 通过网络传输协议来实现访问请求 者和访问控制器在 TNC过程中的数据传输;通过访问控制协议来实现访问请 求者和访问控制器之间的访问控制;
步骤 12、 IF-APS的具体实现: IF-APS通过用户鉴别协议来实现网络访 问请求者和访问控制器之间的用户鉴别; 通过网络传输协议来实现访问请求 者和访问控制器在 TNC过程中的数据传输;
步骤 13、 IF-TNCCAP的具体实现: IF-TNCCAP通过网络连接管理机制 来实现 TNC客户端和 TNC接入点之间的网络连接管理; 通过平台鉴别协议 来实现访问请求者和访问控制器之间的平台鉴别; 通过平台鉴别协议管理机 制来实现对平台鉴别过程中平台鉴别协议的管理; 通过对完整性度量层消息 的封装机制来实现完整性度量层消息的路由;
步骤 14、 IF-EPS的具体实现: IF-EPS通过平台鉴别协议来实现访问请求 者和访问控制器之间的平台鉴别; 通过对完整性度量层消息的封装机制来实 现完整性度量层消息的路由; 通过评估策略动态分发机制来实现对访问请求 者的评估策略的动态分发; 步骤 15、 IF-IMC的具体实现: 包括访问请求者中 IF-IMC的具体实现和 访问控制器中 IF-IMC的具体实现, 其中访问请求者中的 IF-IMC和访问控制 器中的 IF-IMC通过定义功能函数来实现完整性握手;
步骤 16、 IF-IMV的具体实现: IF-IMV通过定义功能函数来实现完整性 握手;
步骤 17、 IF-IM的具体实现: IF-IM通过利用 IMC和 IMV之间所传输消 息的封装方法来实现 IMC和 IMV之间的互通;
步骤 2具体包括:
步骤 21、 网络访问请求者向网络访问控制者发送网络访问请求; 步骤 22、 网络访问请求者、 网络访问控制者和鉴别策略服务者执行
IF-TNT 和 IF-APS 中定义的用户鉴别协议, 其中用户鉴别协议数据是利用 IF-TNT和 IF-APS中定义的网络传输协议进行传输; 用户鉴别协议完成后, 若网络访问控制者要求立即做出访问决策, 则网络访问控制者根据用户鉴别 结果做出访问决策并利用 IF-TNT中定义的访问控制协议执行访问控制,否则 向 TNC接入点发送平台鉴别请求; 若网络访问请求者要求立即做出访问决 策,则网络访问请求者根据用户鉴别结果做出访问决策并利用 IF-TNT中定义 的访问控制协议执行访问控制, 否则向 TNC客户端发送平台鉴别请求; 步骤 23、 当 TNC接入点收到网络访问控制者发送的平台鉴别请求时, 若 TNC接入点通过向评估策略服务者请求对访问请求者的评估策略,则利用 IF-EPS中定义的评估策略动态分发机制进行该评估策略请求;
步骤 24、 当 TNC接入点收到网络访问控制者发送的平台鉴别请求时, TNC接入点利用 IF-TNCCAP中定义的平台鉴别协议启动平台鉴别过程; 当 TNC客户端收到网络访问请求者发送的平台鉴别请求时, 若 TNC接入点没 有收到网络访问控制者发送的平台鉴别请求,则 TNC客户端利用 IF-TNCCAP 中定义的平台鉴别协议启动平台鉴别过程; 访问请求者、 访问控制器和评估 策略服务者执行平台鉴别过程; 步骤 25、平台修补完成后,访问请求者中的 IMC或访问控制器中的 IMC 利用访问请求者中的 IF-IMC或访问控制器中的 IF-IMC中定义的功能函数向 TNC客户端或 TNC接入点请求重新执行平台鉴别过程, 或者评估策略发生 了改变而要求重新执行平台鉴别过程, 则根据网络连接状态和本地安全策略 跳至步骤 21、 步骤 22或步骤 23。
上述步骤 11和步骤 12中用户鉴别协议的实现方式是: 若访问请求者和 访问控制器之间已实现过用户鉴别, 且访问请求者和访问控制器之间的安全 关联仍然有效, 则网络访问请求者和网络访问控制者利用访问请求者和访问 控制器之间的安全关联来实现访问请求者和访问控制器之间的用户鉴别; 否 则, 网络访问请求者、 网络访问控制者和鉴别策略服务者执行三元对等鉴别 协议来实现访问访问请求者和访问控制器之间的用户鉴别, 其中鉴别策略服 务者充当可信第三方角色。
上述步骤 11和步骤 12中网络传输协议实现方式为: 釆用与遂道 EAP封 装传输机制相同的方式对用户鉴别协议数据和平台鉴别协议数据进行封装传 输, 其中用户鉴别协议数据封装在一个封装传输包中, 而平台鉴别协议数据 首先要封装成一个封装传输包并利用安全遂道进行保护, 然后将上述安全遂 道保护的封装传输包嵌套封装在一个封装传输包中。
上述步骤 11和步骤 12中网络传输协议实现方式为: 釆用相互独立的封 装传输机制对用户鉴别协议数据和平台鉴别协议数据进行封装传输, 其中用 户鉴别协议数据独立封装在一个封装传输包中 , 平台鉴别协议数据独立封装 在一个封装传输包中并利用安全遂道进行保护。
上述步骤 11中访问控制协议是基于三元对等鉴别的访问控制方法。 上述步骤 13 中的网络连接管理机制的实现方法是: TNC客户端为每一 对 TNC客户端—— TNC接入点本地创建一个网络连接标识, 用于标识每一 个 TNC过程; TNC接入点为每一对 TNC客户端—— TNC接入点本地创建一 个网络连接标识, 用于标识每一个 TNC过程; 在一个 TNC过程中, TNC客 户端、 TNC接入点和评估策略服务者首先执行一次平台鉴别过程, 若该次平 台鉴别过程后通过进行平台修补,或者评估策略发生了改变,则 TNC客户端、 TNC接入点和评估策略服务者通过重新执行一次平台鉴别过程, TNC客户端 和 TNC接入点保持上述创建的网络连接标识不变,直至该 TNC过程被终止。
上述步骤 13和步骤 14中的平台鉴别协议的实现方法是由 TNC客户端、 TNC接入点和评估策略服务者执行的三元对等鉴别协议, 其中 TNC客户端 和 TNC接入点互相请求对方平台的完整性度量值, TNC客户端和 TNC接入 点仅验证对方平台的完整性度量值的平台签名, 而平台身份证书的有效性验 证和完整性度量值的评估由评估策略服务者来完成。
上述步骤 13中的平台鉴别协议管理机制的实现方法是:在一次平台鉴别 过程中, TNC客户端、 TNC接入点和评估策略服务者可能通过执行多轮平台 鉴别协议, 其中, 在每一轮平台鉴别协议中 TNC客户端和 TNC接入点互相 发送请求对方平台的完整性度量参数, 而向评估策略服务者发送的是已完成 度量的完整性度量参数, 本轮平台鉴别协议完成后, 若请求度量的完整性度 量参数与已完成度量的完整性度量参数不相同, 则 TNC客户端、 TNC接入 点和评估策略服务者通过执行另外一轮平台鉴别协议, 否则本次平台鉴别过 程已成功完成。
上述步骤 13和步骤 14中的对完整性度量层消息的封装机制为: 由消息 类型、 完整性收集者标识和完整性度量层消息构成的封装格式进行封装。 上述步骤 14中的评估策略动态分发机制是 TNC接入点向评估策略服务者请 求对访问请求者的评估策略, 评估策略服务者返回对访问请求者的评估策略 给 TNC接入点。
上述步骤 15中的访问请求者中的 IF-IMC需定义的功能函数为: TNC客 户端发现、 装载访问请求者中的 IMC; TNC客户端初始化访问请求者中的 IMC; 访问请求者中的 IMC向 TNC客户端报告所支持的消息类型; TNC客 户端向访问请求者中的 IMC通告网络连接状态; TNC客户端向访问请求者中 的 IMC通告请求度量的完整性度量参数; 访问请求者中的 IMC向 TNC客户 端发送完整性度量层消息; 访问请求者中的 IMC向 TNC客户端提供完整性 度量值中的平台配置寄存器(Platform Configuration Register, PCR ) 引用数 据, 包括引用的 PCR值和对这些引用 PCR值的平台签名; TNC客户端向访 问请求者中的 IMC通告该轮平台鉴别协议的该步骤消息将要发送, 让访问请 求者中的 IMC停止收集完整性度量值; TNC客户端向访问请求者中的 IMC 发送已收到的完整性度量层消息; TNC客户端终止访问请求者中的 IMC; 访 问请求者中的 IMC向 TNC客户端请求重新执行完整性握手。
上述步骤 15中的访问控制器中的 IF-IMC需定义的功能函数为: TNC接 入点发现、 装载访问控制器中的 IMC; TNC接入点初始化访问控制器中的 IMC; 访问控制器中的 IMC向 TNC接入点报告所支持的消息类型; TNC接 入点向访问控制器中的 IMC通告网络连接状态; TNC接入点向访问控制器中 的 IMC通告请求度量的完整性度量参数; 访问控制器中的 IMC向 TNC接入 点发送完整性度量层消息; 访问控制器中的 IMC向 TNC接入点提供完整性 度量值中 PCR引用数据, 包括引用的 PCR值和对这些引用 PCR值的平台签 名; TNC接入点向访问控制器中的 IMC通告该轮平台鉴别协议的该步骤消息 将要发送,让访问控制器中的 IMC停止收集完整性度量值; TNC接入点向访 问控制器中的 IMC发送已收到的完整性度量层消息; TNC接入点终止访问控 制器中的 IMC; 访问控制器中的 IMC向 TNC接入点请求重新执行完整性握 手。
上述步骤 16中的 IF-IMV通过定义的功能函数为:评估策略服务者发现、 装载策略管理器中的 IMV; 评估策略服务者初始化策略管理器中的 IMV; 策 略管理器中的 IMV向评估策略服务者报告所支持的消息类型;评估策略服务 者向策略管理器中的 IMV通告本轮平台鉴别协议所通过设置的评估策略; 评 估策略服务者向策略管理器中的 IMV发送已收到的完整性度量层消息; 策略 管理器中的 IMV向评估策略服务者发送完整性度量层消息; 策略管理器中的 IMV向评估策略服务者提供完整性度量值中 PCR引用数据,包括引用的 PCR 值和对这些引用 PCR值的平台签名; 策略管理器中的 IMV向评估策略服务 者提供组件级评估结果; 评估策略服务者终止策略管理器中的 IMV。
上述步骤 17中的 IF-IM的封装方法为: 与 TCG-TNC架构中 IF-M的封 装方法相同。
上述步骤 24中, 当 TNC客户端收到 IF-TNCCAP和 IF-EPS中定义的平 台鉴别协议消息时,通过检查 TNC客户端是否已装载和初始化访问请求者中 的 IMC, 若 TNC客户端还没有装载和初始化访问请求者中的 IMC, 则利用 访问请求者中 IF-IMC定义的功能函数载装和初始化访问请求者中的 IMC; 当 TNC接入点收到 IF-TNCCAP和 IF-EPS中定义的平台鉴别协议消息时,通 过检查 TNC接入点是否已装载和初始化访问控制器中的 IMC, 若 TNC接入 点还没有装载和初始化访问控制器中的 IMC, 则利用访问控制器中 IF-IMC 定义的功能函数载装和初始化访问控制器中的 IMC; 当评估策略服务者收到 IF-TNCCAP和 IF-EPS中定义的平台鉴别协议消息时, 通过检查评估策略服 务者是否已装载和初始化策略管理器中的 IMV, 若评估策略服务者还没有装 载和初始化策略管理器中的 IMV, 则利用策略管理器中 IF-IMV定义的功能 函数载装和初始化策略管理器中的 IMV。
上述步骤 24 中, TNC客户端、 TNC接入点和评估策略服务者可执行 IF-TNCCAP和 IF-EPS中定义的平台鉴别协议, 其中平台鉴别协议数据利用 IF-TNT和 IF-APS中定义的网络传输协议进行传输, 评估策略服务者通过为 每一轮平台鉴别协议或每一次平台鉴别过程创建一个会话标识来实现区分。
上述步骤 24 中, 平台鉴别过程完成后, TNC客户端可根据平台鉴别过 请求者; TNC接入点可根据平台鉴别过程中各轮平台鉴别协议中的组件级评 估结果做出访问决策并发送给网络访问控制者, 或者评估策略服务者可根据 平台鉴别过程中各轮平台鉴别协议中的组件级评估结果做出访问决策并发送 给 TNC接入点, 然后 TNC接入点发送给网络访问控制者; 网络访问请求者 和网络访问控制者利用 IF-TNT中定义的访问控制方法执行访问控制。
上述步骤 2中, 对于三元对等鉴别可信网络连接架构中的各个组件, 被 装载或服务启用时被执行完整性校验, 以确定这些组件处于可信赖状态。
本发明的优点是:
1、本发明可建立终端可信,本发明在建立终端可信的过程中,基于 TePA 的 TNC架构中的访问请求者中的完整性收集者、 TNC客户端、 TNC接入点 由终端来实现, 而策略管理器中的完整性校验者和评估策略服务者可由终端 来实现, 也可由第三方服务提供者来实现, 然后执行基于 TePA的 TNC架构 中的平台鉴别过程来建立终端可信。
2、 本发明可实现终端的可信网络连接, 本发明在终端的可信网络连接过 程中, 基于 TePA的 TNC架构中的访问请求者由接入网络的终端来实现, 而 访问控制器和策略管理器由网络服务提供者来实现, 其中策略管理器的部分 功能或所有功能还可以由第三方服务提供者来实现, 然后执行基于 TePA的 TNC架构中的 TNC过程来实现终端的可信网络连接。
3、 本发明可实现终端间的可信认证, 本发明在终端间的可信认证中, 基 于 TePA的 TNC架构中的访问请求者由一个终端来实现, 而访问控制器由另 一个终端来实现, 策略管理器可由网络服务提供者来实现, 其中策略管理器 的部分功能或所有功能还可以由第三方服务提供者来实现, 若终端间已完成 用户鉴别并生成了会话密钥, 则执行基于 TePA的 TNC架构中的平台鉴别过 程来实现终端间的可信认证, 否则执行基于 TePA的 TNC架构中的 TNC过 程来实现终端间的可信认证。
4、本发明可实现对终端的可信管理 ,本发明在对终端的可信管理过程中 , 基于 TePA的 TNC架构中的访问请求者由终端来实现, 而访问控制器和策略 管理器由网络服务提供者来实现, 其中策略管理器的部分功能或所有功能还 可以由第三方服务提供者来实现, 若终端和网络服务提供者之间已完成用户 鉴别并生成了会话密钥, 则执行基于 TePA的 TNC架构中的平台鉴别过程来 实现对终端的可信管理, 否则执行基于 TePA的 TNC架构中的 TNC过程来 实现对终端的可信管理。
5、 本发明可广泛应用, 本发明基于 TePA的 TNC架构的具体实现中的 平台鉴别过程可釆用一轮平台鉴别协议完成, 也可以釆用多轮平台鉴别协议 完成, 满足不同网络设备的需求。
6、 本发明有利于独立实现, 本发明在基于 TePA的 TNC架构的具体实 现中, 策略管理器不参与网络连接管理, 是一个独立的角色, 有利于独立实 现, 从而使得策略管理器完全可以由可信第三方来实现; 附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案, 下面将对实 施例中所需要使用的附图作简单地介绍, 显而易见地, 下面描述中的附图仅 仅是本发明的一些实施例, 对于本领域普通技术人员来讲, 在不付出创造性 劳动的前提下, 还可以根据这些附图获得其他的附图。
图 1为现有技术中 TCG-TNC架构示意图;
图 2为现有技术中基于 TePA的 TNC架构示意图;
图 3为本发明的访问请求者中 IF-IMC的交互示意图;
图 4为本发明的访问控制器中 IF-IMC的交互示意图;
图 5为本发明的策略管理器中 IF-IMV的交互示意图。 具体实施方式
下面将结合本发明实施例中的附图, 对本发明实施例中的技术方案进行 清楚、 完整地描述, 显然, 所描述的实施例仅仅是本发明一部分实施例, 而 不是全部的实施例。 基于本发明中的实施例, 本领域普通技术人员在没有作 出创造性劳动前提下所获得的所有其他实施例, 都属于本发明保护的范围。 本发明提供了一种三元对等鉴别可信网络连接架构的实现方法, 该方法 包括以下步骤:
步骤 1、 通过定义接口建立三元对等鉴别可信网络连接架构;
步骤 2、 实现三元对等鉴别可信网络连接架构的可信网络连接。
其中, 步骤 1具体包括:
步骤 11、 IF-TNT和 IF-APS的具体实现方法: IF-TNT和 IF-APS中定义的用 户鉴别协议可以釆用基于对称密钥和非对称密钥的三元对等鉴别协议, 如: 中国无线局域网标准中的 WAI协议。
IF-TNT和 IF-APS中定义的网络传输协议可以为: 协议数据封装包可以釆 用与 EAP相同或类似的协议数据封装包, 但该协议数据封装包的处理与 EAP 不一样, 该协议数据封装包在访问控制器处通过解析包, 然后再封装成另一 个协议数据封装包发送给另外一方, 不像 EAP是一个点到点协议的封装包和 解析包处理过程, 而是一个三方协议的封装包和解析包处理过程, 其中三方 协议封装包可称为三元认证扩展协议封装包 ( Tri-element Authentication Extensible Protocol, TAEP ); 用户鉴别协议数据和平台鉴别协议数据可以釆 用与遂道 EAP类似的封装方法进行封装, 也可以釆用相互独立的封装方法进 行封装, 对于前者, 访问请求者和访问控制器将收到一个成功类型的协议数 据封装包, 如: TAEP-success封装包, 与整个 TNC过程相对应, 对于后者, 访问请求者和访问控制器将收到两个成功类型的协议数据封装包, 如: TAEP-success封装包, 分别与用户鉴别过程、 平台鉴别过程相对应。
IF-TNT和 IF-APS中定义的访问控制协议可以釆用基于三元对等鉴别的 访问控制方法, 如: 中国无线局域标准中所釆用的访问控制方法。
步骤 12、 IF-TNCCAP和 IF-EPS的具体实现方法: IF-TNCCAP中定义的网 络连接管理机制可以为: TNC客户端本地生成与 TNC接入点的网络连接标识, TNC接入点本地生成与 TNC客户端的网络连接标识, 网络连接标识用 ConnectionID表示; TNC客户端和 TNC接入点为每一个 ConnectionID设置一些 网络连接状态, 如: 创建、 完整性握手、 允许、 禁止、 隔离和终止连接。 在 一个 TNC过程中, TNC客户端、 TNC接入点和评估策略服务者首先执行一次 平台鉴别过程, 若本次平台鉴别过程后需要进行平台修补, 或者评估策略发 生了改变, 则 TNC客户端、 TNC接入点和评估策略服务者需要重新执行一次 平台鉴别过程, TNC客户端和 TNC接入点保持上述创建的 ConnectionID不变, 但网络连接状态可以设置为不同状态, 直至该 TNC过程被终止。
IF-TNCCAP中定义的平台鉴别协议管理机制可以为: 在一次平台鉴别过 程中, TNC客户端、 TNC接入点和评估策略服务者可能需要执行多轮平台鉴 别协议, 其中, 在每一轮平台鉴别协议中 TNC客户端和 TNC接入点互相发送 请求对方平台的完整性度量参数, 而向评估策略服务者发送的是已完成度量 的完整性度量参数, 本轮平台鉴别协议完成后, 若请求度量的完整性度量参 数与已完成度量的完整性度量参数不相同, 则 TNC客户端、 TNC接入点和评 估策略服务者需要执行另外一轮平台鉴别协议, 否则本次平台鉴别过程已成 功完成。
IF-EPS中定义的评估策略动态分发机制可以为: 评估策略服务者为每一 级别用户、 每一级别服务设置对应的评估策略, TNC接入点可以将访问请求 者的用户身份、 或者访问请求者所请求的服务、 或者访问请求者的用户身份 和所请求的服务发送给评估策略服务者, 然后评估策略服务者依据本地的设 置向 TNC接入点返回对访问请求者的评估策略。
IF-TNCCAP和 IF-EPS中定义的对完整性度量层消息的封装机制可为 (消 息类型 +完整性收集者标识 +完整性度量层消息表) 列表, 该消息类型可由 组件类型和厂家标识构成:
Figure imgf000015_0001
IF-TNCCAP和 IF-APS中定义的平台鉴别协议是由 TNC客户端、 TNC接入 点和评估策略服务者执行的三元对等鉴别协议, 其中 TNC客户端和 TNC接入 点互相请求对方平台的完整性度量值, TNC客户端和 TNC接入点仅验证对方 平台的完整性度量值的平台签名, 而平台身份证书的有效性验证和完整性度 量值的评估由评估策略服务者来完成。
步骤 13、 访问请求者中 IF-IMC的具体实现方法:
访问请求者中 IF-IMC的功能函数为:
步骤 131、 发现、 装载访问请求者中的 IMC的函数, 它与特定平台相关, 可以利用不同的方法实现;
步骤 132、 TNC—IMC— Initialize { imcID , min Version , max Version , *pOutActualVersion } , 用于初始化 IMC, 由访问请求者中的 IMC实现, 其中 imcID为 TNC客户端为该 IMC分配的完整性收集者标识, min Version和 max Version是 TNC客户端支持的应用接口函数版本号, *pOutActualVersion是 实际使用的应用接口函数版本号;
步骤 133、 TNC TNCC ReportMessageTypes { imcID , supportedTypes , typeCount ) , 用于访问请求者中的 IMC向 TNC客户端通告所支持的消息类型, 由 TNC客户端实现, 其中 supportedTypes为访问请求者所支持的各个消息类 型, typeCount为访问请求者所支持的消息类型的数目;
步骤 134、 TNC IMC NotifyConnectionChange { imcID , connectionID , newState } ,用于 TNC客户端向访问请求者中的 IMC通告网络连接状态,由 IMC 实现, 其中 connectionID为 TNC客户端创建的网络连接标识, newState为网络 连接状态;
步骤 135、 TNC IMC RequestMeasurementlnfo { imcID , connectionID , Measurementlnfo } , 用于 TNC客户端向访问请求者中的 IMC通知请求度量的 完整性度量参数, 由 IMC实现, 其中 Measurementlnfo为请求度量的完整性度 量参数;
步骤 136、 TNC— TNCC— SendMessage { imcID , connectionID , messgae , messageLength, messageType } , 用于访问请求者中的 IMC向 TNC客户端发送 完整性度量层消息, 由 TNC客户端实现, 其中 messgae为完整性度量层消息, messageLength为 message的长度, messageType为 message的消息类型; 步骤 137 、 TNC TNCC ProvidePCRsIndex { imcID , connectionID , PCRsIndex) , 用于访问请求者中的 IMC向 TNC客户端提供完整性度量值中的 PCR引用数据 (可信平台评估层组件可知的) , 由 TNC客户端实现, 其中 PCRsIndex为完整性度量值中的 PCR引用数据;
步骤 138、 TNC IMC PAIEnding { imcID, connectionID } , 用于 TNC客 户端向访问请求者中的 IMC通告该轮平台鉴别协议的该步骤消息将要发送, 让访问请求者中的 IMC停止收集完整性度量值, 由 IMC实现;
步骤 139、 TNC IMC ReceiveMessage { imcID , connectionID , messgae, messageLength, messageType } , 用于 TNC客户端向访问请求者中的 IMC发送 已收到的完整性度量层消息, 由 IMC实现;
步骤 1310、 TNC—IMC— Terminate { imcID }, 用于 TNC客户端终止访问请 求者中的 IMC, 由 IMC实现;
步骤 1311、 TNC TNCC RequestHandshakeRetry { imcID, connectionID, reason } , 用于访问请求者中的 IMC向 TNC客户端请求重新执行完整性握手, 由 TNC客户端实现, 其中 reason为请求重新执行完整性握手的原因。
图 3为本发明的访问请求者中 IF-IMC的交互示意图, 在平台鉴别过程中, 访问请求者中 IF-IMC的交互示意图, 参见图 3。 在图 3中, IF-IMC中的虚线功 能函数调用箭头表示可选的, 而实线功能函数调用箭头表示必备的, 完整性 握手过程中的平台鉴别协议可以是任意轮的(不局限于 2轮), 直至做出访问 决策为止, 且访问请求者和访问控制器都可以发起平台鉴别协议。
步骤 14、 访问控制器中 IF-IMC的具体实现方法
访问控制器中 IF-IMC的功能函数为:
步骤 141、 发现、 装载访问控制器中的 IMC的函数, 它与特定平台相关, 可以利用不同的方法实现;
步骤 142、 TNC—IMC— Initialize { imcID , min Version , max Version , *pOutActualVersion } , 用于初始化 IMC, 由访问控制器中的 IMC实现, 其中 imcID为 TNC接入点为该 IMC分配的完整性收集者标识, min Version和 max Version是 TNC接入点支持的应用接口函数版本号, *pOutActualVersion是 实际使用的应用接口函数版本号;
步骤 143、 TNC TNCAP ReportMessageTypes { imcID, supportedTypes , typeCount ) , 用于访问控制器中的 IMC向 TNC接入点通告所支持的消息类型, 由 TNC接入点实现, 其中 supportedTypes为访问控制器所支持的各个消息类 型, typeCount为访问控制器所支持的消息类型的数目;
步骤 144、 TNC IMC NotifyConnectionChange { imcID , connectionlD , newState } ,用于 TNC接入点向访问控制器中的 IMC通告网络连接状态,由 IMC 实现, 其中 connectionlD为 TNC接入点创建的网络连接标识, newState为网络 连接状态;
步骤 145、 TNC IMC RequestMeasurementlnfo { imcID , connectionlD , Measurementlnfo } , 用于 TNC接入点向访问控制器中的 IMC通知请求度量的 完整性度量参数, 由 IMC实现, 其中 Measurementlnfo为请求度量的完整性度 量参数;
步骤 146、 TNC TNCAP SendMessage { imcID, connectionlD, messgae, messageLength, messageType } , 用于访问控制器中的 IMC向 TNC接入点发送 完整性度量层消息, 由 TNC接入点实现, 其中 messgae为完整性度量层消息, messageLength为 message的长度, messageType为 message的消息类型;
步骤 147、 TNC TNCAP ProvidePCRsIndex { imcID , connectionlD ,
PCRsIndex ) , 用于访问控制器中的 IMC向 TNC接入点提供完整性度量值中的 PCR引用数据 (可信平台评估层组件可知的) , 由 TNC接入点实现, 其中 PCRsIndex为完整性度量值中的 PCR引用数据;
步骤 148、 TNC IMC PAIEnding { imcID, connectionlD } , 用于 TNC接 入点向访问控制器中的 IMC通告该轮平台鉴别协议的该步骤消息将要发送, 让访问控制器中的 IMC停止收集完整性度量值, 由 IMC实现; 步骤 149、 TNC IMC ReceiveMessage { imcID , connectionID , messgae, messageLength, messageType } , 用于 TNC接入点向访问控制器中的 IMC发送 已收到的完整性度量层消息, 由 IMC实现;
步骤 1410、 TNC—IMC— Terminate { imcID }, 用于 TNC接入点终止访问控 制器中的 IMC, 由 IMC实现;
步骤 1411、 TNC TNCAP RequestHandshakeRetry { imcID , connectionID , reason } , 用于访问控制器中的 IMC向 TNC接入点请求重新执行完整性握手, 由 TNC接入点实现, 其中 reason为请求重新执行完整性握手的原因。
图 4为本发明的访问控制器中 IF-IMC的交互示意图, 在平台鉴别过程中, 访问控制器中 IF-IMC的交互示意图, 参见图 4。 在图 4中, IF-IMC中的虚线功 能函数调用箭头表示可选的, 而实线功能函数调用箭头表示必备的, 完整性 握手过程中的平台鉴别协议可以是任意轮的(不局限于 2轮), 直至做出访问 决策为止, 且访问请求者和访问控制器都可以发起平台鉴别协议。
步骤 15、 IF-IMV的具体实现方法:
策略管理器中 IF-IMV的功能函数为:
步骤 151、 发现、 装载策略管理器中的 IMV的功能函数, 它与特定平台相 关, 可以利用不同的方法实现;
步骤 152、 TNC—IMV— Initialize { imvID , min Version , max Version , *pOutActualVersion } , 用于评估策略服务者初始化策略管理器中的 IMV, 由 策略管理器中的 IMV实现,其中 imvID为评估策略服务者为该策略管理器中的 IMV分配的完整性校验者标识, min Version和 maxVersion是评估策略服务者支 持的应用接口函数版本号, *pOutActual Version是实际使用的应用接口函数版 本号;
步骤 153、 TNC EPS ReportMessageTypes { imvID , supportedTypes , typeCount ) , 用于策略管理器中的 IMV向评估策略服务者通告所支持的消息 类型, 由评估策略服务者实现, 其中 supportedTypes为策略管理器中的 IMV所 支持的各个消息类型, typeCount为策略管理器中的 IMV所支持的消息类型的 数目;
步骤 154 、 TNC IMV SetAttributePolicy { imvID , PAIBindingID , AttributePolicy } , 用于评估策略服务者向策略管理器中的 IMV通告本轮平台 鉴别协议所通过设置的评估策略, 由策略管理器中的 IMV实现, 其中 PAIBindingID为评估策略服务者为本轮平台鉴别协议创建的平台鉴别协议绑 由平台鉴别协议中访问控制器的平台鉴别校验挑战 NAC-PM和访问请求者的 平台鉴别请求挑战 NAR共同导出的一个随机数, AttributePolic为所通过设置 的评估策略;
步骤 155、 TNC IMV ReceiveMessage { imvID, PAIBindingID, messgae, messageLength, messageType } , 用于评估策略服务者向策略管理器中的 IMV 发送已收到的完整性度量层消息, 由策略管理器中的 IMV实现, 其中 messgae 为完整性度量层消息 , messageLength为 message的长度, messageType为 message的消息类型;
步骤 156、 TNC— EPS— SendMessage { imvID , PAIBindingID , messgae , messageLength, messageType } , 用于策略管理器中的 IMV向评估策略服务者 发送完整性度量层消息, 由评估策略服务者实现;
步骤 157、 TNC EPS ProvideRecommendation { imvID , PAIBindingID , recommendation, evaluation } , 用于策略管理器中的 IMV向评估策略服务者提 供组件级评估结果(可信平台评估层组件可知的), 由评估策略服务者实现, 估结果中的评定结果;
步骤 158 、 TNC EPS ProvidePCRsIndex { imvID , PAIBindingID , PCRsIndex ) , 用于策略管理器中的 IMV向评估策略服务者提供完整性度量值 中的 PCR引用数据(可信平台评估层组件可知的) , 由评估策略服务者实现, 其中 PCRsIndex为完整性度量值中的 PCR引用数据;
步骤 159、 TNC—IMV— Terminate { imvID } , 用于评估策略服务者终止的 策略管理器中的 IMV, 由策略管理器中的 IMV实现;
图 5为本发明的策略管理器中 IF-IMV的交互示意图, 在平台鉴别过程中, 策略管理器中 IF-IMV的交互示意图, 参见图 5。 在图 5中, IF-IMV中的虚线功 能函数调用箭头表示可选的, 而实线功能函数调用箭头表示必备的, 完整性 握手过程中的平台鉴别协议可以是任意轮的(不局限于 2轮), 直至做出访问 决策为止, 且访问请求者和访问控制器都可以发起平台鉴别协议。
步骤 16、 IF-IM的具体实现方法:
除了使用 TNC— IMC— RequestMeasurementlnfo来完成 TCG-TNC架构中的 请求完整性度量属性功能(使用完整性度量层消息来完成, 即使用 IF-M消息 来完成)夕卜, 其他与 TCG-TNC架构中 IF-M相同。
步骤 2、 实现三元对等鉴别可信网络连接架构的可信网络连接, 其具体步 骤是:
步骤 21、 网络访问请求者向网络访问控制者发送网络访问请求; 步骤 22、 网络访问请求者、 网络访问控制者和鉴别策略服务者执行用户 鉴别协议, 如: 中国无线局域网标准中 WAI协议, 其中用户鉴别协议数据釆 用 TAEP包封装传输。 用户鉴别协议完成后, 若网络访问控制者要求立即做出 访问决策, 则网络访问控制者根据用户鉴别结果做出访问决策并釆用基于三 元等鉴别的访问控制方法 (如: 中国无线局域网标准中所釆用的访问控制方 法)执行访问控制, 否则向 TNC接入点发送平台鉴别请求; 若网络访问请求 者要求立即做出访问决策, 则网络访问请求者根据用户鉴别结果做出访问决 策并釆用基于三元等鉴别的访问控制方法(如: 中国无线局域网标准中所釆 用的访问控制方法)执行访问控制, 否则向 TNC客户端发送平台鉴别请求。 在装载 TNC接入点, 或 TNC接入点的服务启动时, 访问控制器中的 PTS可以 扫描 TNC接入点的文件代码和内存代码, 以保证其可信赖性。 在装载 TNC客 户端, 或 TNC客户端的服务启动时, 访问请求者中的 PTS可以扫描 TNC客户 端的文件代码和内存代码, 以保证其可信赖性。
步骤 23、 当 TNC接入点收到网络访问控制者发送的平台鉴别请求时, 若 TNC接入点通过向评估策略服务者请求对访问请求者的评估策略, 则基于访 问请求者的用户级别和访问请求者所请求的服务级别向评估策略服务者发送 评估策略请求, 然后评估策略服务者下发相应的评估策略。 在装载评估策略 服务者, 或评估策略服务者的服务启动时, 策略管理器中的 PTS可以扫描评 估策略服务者的文件代码和内存代码, 以保证其可信赖性。 在请求评估策略 过程中, 由于涉及到可信赖性, 所以 TNC接入点可以利用访问控制器中的 IF-PTS向 PTS请求扫描网络访问控制者的文件代码和内存代码,以保证其可信 赖性; 评估策略服务者可以利用策略管理器中的 IF-PTS请求扫描鉴别策略服 务者的文件代码和内存代码, 以保证其可信赖性。
步骤 24平台鉴别过程
步骤 241、 当 TNC接入点收到网络访问控制者发送的平台鉴别请求, 或者 通过执行另一轮平台鉴别协议时, TNC接入点启动平台鉴别过程, 并构造平 台鉴别协议中的消息 1发送给 TNC客户端;
步骤 242、 若 TNC客户端收到的平台鉴别协议中的消息 1为首轮平台鉴别 协议消息 (若 TNC客户端此时还没有装载和初始化访问请求者中的 IMC, 则 利用访问请求者中 的 IMC平 台 绑定方法、 TNC—IMC— Initialize和 TNC— TNCC— ReportMessageTypes来实现访问请求者中 IMC的装载和初始 化 ) , 则 TNC客户 端 本地创 建 ConnectionID , 并 可 以 调 用 TNC— IMC— NotifyConnectionChange向访问请求者中的 IMC通告网络连接状态 为 CREATE, 接着可以调用 TNC—IMC— NotifyConnectionChange向访问请求者 中的 IMC通告网络连接状态为 HANDSHAKE, 表示访问请求者中的 IMC与策 略管理器中 的 IMV之间 的完整性握手过程开始 , 然后调用 TNC—IMC— RequestMeasurementlnfo向访问请求者中的 IMC通告请求度量的完 整性度量参数 , 否则直接调用 TNC—IMC— RequestMeasurementlnfo向访问请求 者中的 IMC通告请求度量的完整性度量参数, 访问请求者中的 IMC收到请求 度量的完整性度量参数后利用访问请求者中的 IF-PTS请求 PTS执行度量,并生 成对访问请求者的完整性度量值;
步骤 243、访问请求者中的 IMC调用 TNC— TNCC— SendMessage向 TNC客户 端 发 送 对 访 问 请 求 者 的 完 整 性 度 量 值 , 还 可 以 调 用 TNC— TNCC— ProvidePCRsIndex向 TNC客户端提供可信平台评估层组件可知 的 PCR引用数据;
步骤 244、 当该轮平台鉴别协议的该步骤消息将要发送, 则 TNC客户端首 先调用 TNC— IMC— PAIEnding向访问请求者中的 IMC通告让访问请求者中的 IMC停止收集完整性度量值;
步骤 245、当 TNC客户端收到 TNC接入点发送的平台鉴别协议中的消息 1 , 即步骤 241〜步骤 244存在时, TNC客户端构造平台鉴别协议中的消息 2发送给 TNC接入点; 当 TNC客户端没有收到 TNC接入点发送的平台鉴别协议中的消 息 1 , 即步骤 241〜步骤 244不存在时, 若 TNC客户端收到网络访问请求者发送 的平台鉴别请求, 或者通过执行另一轮平台鉴别协议, 则 TNC客户端启动平 台鉴别过程, 并构造平台鉴别协议中的消息 2发送给 TNC接入点;
步骤 246、 若 TNC接入点收到的平台鉴别协议中的消息 2为首轮平台鉴别 协议消息 (若 TNC接入点此时还没有装载和初始化访问控制器中的 IMC, 则 利用访问控制器中 的 IMC平 台 绑定方法、 TNC—IMC— Initialize和 TNC— TNCAP— ReportMessageTypes来实现访问控制器中 IMC的装载和初始 化 ) , 则 TNC接入点 本地创 建 ConnectionID , 并 可 以 调 用 TNC—IMC— NotifyConnectionChange向访问控制器中的 IMC通告网络连接状态 为 CREATE, 接着可以调用 TNC—IMC— NotifyConnectionChange向访问控制器 中的 IMC通告网络连接状态为 HANDSHAKE, 表示访问控制器中的 IMC与策 略管理器中 的 IMV之间 的完整性握手过程开始 , 然后调用 TNC— IMC— RequestMeasurementlnfo向访问控制器中的 IMC通告请求度量的完 整性度量参数, 否则直接调用 TNC—IMC— RequestMeasurementlnfo向访问控制 器中的 IMC通告请求度量的完整性度量参数, 访问控制器中的 IMC收到请求 度量的完整性度量参数后利用访问控制器中的 IF-PTS请求 PTS执行度量,并生 成对访问控制器的完整性度量值;
步骤 247、 访问控制器中的 IMC调用 TNC— TNCAP— SendMessage向 TNC接 入点 发送对访 问 控 制 器 的 完 整性度量值 , 还可 以 调 用 TNC— TNCAP— ProvidePCRsIndex向 TNC接入点提供可信平台评估层组件可知 的 PCR引用数据;
步骤 248、 当该轮平台鉴别协议的该步骤消息将要发送, 则 TNC接入点首 先调用 TNC— IMC— PAIEnding向访问控制器中的 IMC通告让访问控制器中的 IMC停止收集完整性度量值;
步骤 249、 TNC接入点构造平台鉴别协议中的消息 3发送给评估策略服务 者;
步骤 2410、 评估策略服务者收到 TNC接入点发送的平台鉴别协议中的消 息 3后, 首先调用 TNC— IMV— SetAttributePolicy向策略管理器中的 IMV通告本 轮平台鉴别协议所通过设置的评估策略,然后调用 TNC—IMV— ReceiveMessage 来向策略管理器中的 IMV发送已收到的完整性度量层消息;
步骤 2411、 策略管理器中的 IMV收到步骤 2410中发送的消息后, 将这些 消息发给与策略管理器中的 IMV相连接的 PTS, 若 PTS解析这些信息出错, 则 生成组件级错误信息并发送给策略管理器中的 IMV,否则 PTS解析这些消息并 在后台 (TCG-TNC架构定义的)参照完整性清单数据库的协助下生成组件级 评估结果和平台修补信息;
步骤 2412、 策略管理器中的 IMV调用 TNC— EPS— SendMessage向评估策略 服务者发送步骤 2411中生成的完整性度量层消息。
步骤 2413、 策略管理器中的 IMV可以调用 TNC— EPS— ProvideRecommendation 向评估策略服务者提供组件级评估结果(可信平台评估层组件可知的) ; 步骤 2414、 策略管理器中的 IMV可以调用 TNC— EPS— ProvidePCRsIndex向 评估策略服务者提供完整性度量值中的 PCR引用数据 (可信平台评估层组件 可知的) ;
步骤 2415、评估策略服务者构造平台鉴别协议中的消息 4并发送给 TNC接 入点;
步骤 2416、 TNC接入点收到评估策略服务者发送的平台鉴别协议中的消 息 4后,首先调用 TNC— IMC— ReceiveMessage向访问控制器中的 IMC发送已 收到的完整性度量层消息, 若对访问请求者的评估已完成, 则根据对访问请 求者的完整性度量值的组件级评估结果生成访问控制器的访问决策, 否则表 明 TNC接入点通过执行另一轮平台鉴别协议, 即: 该轮平台鉴别协议结束后 重新从步骤 241开始执行,然后 TNC接入点构造平台鉴别协议中的消息 5发 送给 TNC客户端;
步骤 2417、 TNC客户端收到步骤 2416中发送的平台鉴别协议中的消息 5 后,首先调用 TNC—IMC— ReceiveMessage向访问请求者中的 IMC发送已收到的 完整性度量层消息, 若收到访问控制器的访问决策(表示对访问请求者的平 台鉴别已经完成) , 则可以调用 TNC— IMC— NotifyConnectionChange向访问请 求者中的 IMC通告访问控制器的访问决策(也就是网络连接状态) , 若对访 问控制器的评估已完成, 则根据对访问控制器的完整性度量值的组件级评估 结果生成访问请求者的访问决策, 否则表明 TNC客户端通过执行另一轮平台 鉴别协议, 即: 该轮平台鉴别协议结束后重新从步骤 245开始执行, 然后 TNC 客户端构造平台鉴别协议中的消息 6发送给 TNC接入点;
步骤 2418、 TNC接入点收到步骤 2417中发送的平台鉴别协议中的消息 6 后, 可以调用 TNC—IMC— NotifyConnectionChange向访问控制器中的 IMC通告 访问请求者的访问决策(也就是网络连接状态) 。
步骤 25 、 平 台 修补完成后 , 访 问 请求者 中 的 IMC调用 TNC— TNCC— RequestHandshakeRetry向 TNC客户端请求重新执行完整性握手, 访问控制器中的 IMC调用 TNC—TNCAP— RequestHandshakeRetry向 TNC接入点 请求重新执行完整性握手, 或者评估策略发生了改变, 从而通过重新执行平 台鉴别过程, 则根据网络连接状态和本地安全策略跳至步骤 21、 步骤 22或步 骤 24。
上述步骤 24描述了一个完整的平台鉴别过程, 其中的平台鉴别协议可以 为上面所述的 IF-TNCCAP和 IF-PTS的具体实现方法中的平台鉴别协议, 若应 用于单向平台鉴别, 则可以选用步骤 24中的一些子步骤来实现。
在上述步骤 24中, 为了保证 TNC客户端、 TNC接入点和评估策略服务者 的可信赖性, 在装载 TNC客户端, 或 TNC客户端的服务启动时, 访问请求者 中的 PTS可以扫描 TNC客户端的文件代码和内存代码, 在装载 TNC接入点, 或 TNC接入点的服务启动时, 访问控制器中的 PTS可以扫描 TNC接入点的文 件代码和内存代码, 在装载评估策略服务者, 或评估策略服务者的服务启动 时, 策略管理器中的 PTS可以扫描评估策略服务者的文件代码和内存代码。
在上述步骤 24中, 为了保证访问请求者中的 IMC、 访问控制器中的 IMC 和策略管理器中的 IMV的可信赖性, 在装载访问请求者中的 IMC, 或访问请 求者中的 IMC的服务启动时, TNC客户端可以利用访问请求者中的 IF-PTS向 访问请求者中的 PTS请求扫描访问请求者中的 IMC的文件代码和内存代码 ,在 装载访问控制器中的 IMC, 或访问控制器中的 IMC的服务启动时, TNC接入 点可以利用访问控制器中的 IF-PTS向访问控制器中的 PTS请求扫描访问控制 器中的 IMC的文件代码和内存代码, 在装载策略管理器中的 IMV, 或策略管 理器中的 IMV的服务启动时, 评估策略服务者可以利用策略管理器中的 IF-PTS向策略管理器中的 PTS请求扫描策略管理器中的 IMV的文件代码和内 存代码。
在上述步骤 24中, 为了保证网络访问请求者、 网络访问控制者和鉴别策 略服务者的可信赖性, 在装载网络访问请求者, 或网络访问请求者的服务启 动时, TNC客户端可以利用访问请求者中的 IF-PTS向访问请求者中的 PTS请求 扫描网络访问请求者的文件代码和内存代码, 在装载网络访问控制者, 或网 络访问控制者的服务启动时, TNC接入点可以利用访问控制器中的 IF-PTS向 访问控制器中的 PTS请求扫描网络访问控制者的文件代码和内存代码, 在装 载鉴别策略服务者, 或鉴别策略服务者的服务启动时, 评估策略服务者可以 利用策略管理器中的 IF-PTS向策略管理器中的 PTS请求扫描鉴别策略服务者 的文件代码和内存代码。

Claims

权 利 要 求
1、 一种三元对等鉴别可信网络连接架构的实现方法, 其特征在于: 该方 法包括以下步骤:
步骤 1、 通过定义接口建立三元对等鉴别可信网络连接架构;
步骤 2、 实现三元对等鉴别可信网络连接架构的可信网络连接; 其中, 步骤 1包括:
步骤 11、可信网络传输接口 IF-TNT的实现: 所述 IF-TNT通过用户鉴别 协议来实现网络访问请求者和访问控制器之间的用户鉴别; 通过网络传输协 议来实现访问请求者和访问控制器在可信网络连接 TNC过程中的数据传输; 通过访问控制协议来实现访问请求者和访问控制器之间的访问控制;
步骤 12、 鉴别策略服务接口 IF- APS的实现: 所述 IF-APS通过用户鉴别 协议来实现网络访问请求者和访问控制器之间的用户鉴别; 通过网络传输协 议来实现访问请求者和访问控制器在 TNC过程中的数据传输;
步骤 13、 TNC 客户端 - TNC接入点接口 IF-TNCCAP 的实现: 所述 IF-TNCCAP通过网络连接管理机制来实现 TNC客户端和 TNC接入点之间的 网络连接管理; 通过平台鉴别协议来实现访问请求者和访问控制器之间的平 台鉴别; 通过平台鉴别协议管理机制来实现对平台鉴别过程中平台鉴别协议 的管理; 通过对完整性度量层消息的封装机制来实现完整性度量层消息的路 由;
步骤 14、 评估策略服务接口 IF-EPS的实现: 所述 IF-EPS通过平台鉴别 协议来实现访问请求者和访问控制器之间的平台鉴别; 通过对完整性度量层 消息的封装机制来实现完整性度量层消息的路由; 通过评估策略动态分发机 制来实现对访问请求者的评估策略的动态分发;
步骤 15、 完整性度量收集者接口 IF-IMC的实现: 包括访问请求者中所 述 IF-IMC的具体实现和访问控制器中所述 IF-IMC的具体实现, 其中所述访 问请求者中的所述 IF-IMC和所述访问控制器中的所述 IF-IMC通过定义功能 函数来实现完整性握手;
步骤 16、 完整性度量校验接口 IF-IMV的实现: 所述 IF-IMV通过定义功 能函数来实现完整性握手;
步骤 17、 完整性度量校验 IF-IM的实现: 所述 I F-IM通过利用完整性度 量收集者 IMC 和完整性度量校验 IMV之间所传输消息的封装方法来实现 IMC和 IMV之间的互通;
步骤 2包括:
步骤 21、所述网络访问请求者向所述网络访问控制者发送网络访问请求; 步骤 22、 所述网络访问请求者、 所述网络访问控制者和所述鉴别策略服 务者执行所述 IF-TNT和所述 IF-APS中定义的用户鉴别协议, 其中用户鉴别 协议数据是利用所述 IF-TNT 和所述 IF-APS 中定义的网络传输协议进行传 输; 用户鉴别协议完成后, 若网络访问控制者要求立即做出访问决策, 则网 络访问控制者根据用户鉴别结果做出访问决策并利用所述 IF-TNT 中定义的 访问控制协议执行访问控制, 否则向所述 TNC接入点发送平台鉴别请求; 若 网络访问请求者要求立即做出访问决策, 则网络访问请求者根据用户鉴别结 果做出访问决策并利用所述 IF-TNT中定义的访问控制协议执行访问控制,否 则向 TNC客户端发送平台鉴别请求;
步骤 23、 当所述 TNC接入点收到网络访问控制者发送的平台鉴别请求 时, 若所述 TNC接入点通过向评估策略服务者请求对访问请求者的评估策 步骤 24、 当所述 TNC接入点收到网络访问控制者发送的平台鉴别请求 时, 所述 TNC接入点利用所述 IF-TNCCAP中定义的平台鉴别协议启动平台 鉴别过程; 当所述 TNC客户端收到网络访问请求者发送的平台鉴别请求时, 若所述 TNC接入点没有收到网络访问控制者发送的平台鉴别请求, 则所述 TNC客户端利用所述 IF-TNCCAP中定义的平台鉴别协议启动平台鉴别过程; 访问请求者、 访问控制器和评估策略服务者执行平台鉴别过程; 步骤 25、平台修补完成后,访问请求者中的完整性收集者 IMC或访问控 制器中的 IMC 利用访问请求者中的所述 IF-IMC 或访问控制器中的所述 IF-IMC中定义的功能函数向 TNC客户端或 TNC接入点请求重新执行平台鉴 别过程, 或者评估策略发生了改变而要求重新执行平台鉴别过程, 则根据网 络连接状态和本地安全策略跳至步骤 21、 步骤 22或步骤 23。
2、 根据权利要求 1所述的三元对等鉴别可信网络连接架构的实现方法, 其特征在于: 所述步骤 11和步骤 12中用户鉴别协议的实现方式是: 若访问 请求者和访问控制器之间已实现过用户鉴别, 且所述访问请求者和所述访问 控制器之间的安全关联仍然有效, 则所述网络访问请求者和所述网络访问控 制者利用所述访问请求者和所述访问控制器之间的安全关联来实现访问请求 者和访问控制器之间的用户鉴别; 否则, 所述网络访问请求者、 所述网络访 问控制者和所述鉴别策略服务者执行三元对等鉴别协议来实现访问所述访问 请求者和所述访问控制器之间的用户鉴别, 其中所述鉴别策略服务者充当可 信第三方角色。
3、 根据权利要求 1所述的三元对等鉴别可信网络连接架构的实现方法, 其特征在于: 所述步骤 11和步骤 12中网络传输协议实现方式为: 釆用与遂 道可扩展认证协议 EAP封装传输机制相同的方式对用户鉴别协议数据和平台 鉴别协议数据进行封装传输, 其中用户鉴别协议数据封装在一个封装传输包 中, 而平台鉴别协议数据首先要封装成一个封装传输包并利用安全遂道进行 保护,然后将所述安全遂道保护的封装传输包嵌套封装在一个封装传输包中。
4、 根据权利要求 1所述的三元对等鉴别可信网络连接架构的实现方法, 其特征在于: 所述步骤 11和步骤 12中网络传输协议实现方式为: 釆用相互 独立的封装传输机制对用户鉴别协议数据和平台鉴别协议数据进行封装传 输, 其中用户鉴别协议数据独立封装在一个封装传输包中, 平台鉴别协议数 据独立封装在一个封装传输包中并利用安全遂道进行保护。
5、 根据权利要求 1所述的三元对等鉴别可信网络连接架构的实现方法, 其特征在于:所述步骤 11中访问控制协议是基于三元对等鉴别的访问控制方 法。
6、 根据权利要求 1所述的三元对等鉴别可信网络连接架构的实现方法, 其特征在于: 所述步骤 13 中的网络连接管理机制的实现方法是: TNC客户 端为每一对 TNC客户端—— TNC接入点本地创建一个网络连接标识, 用于 标识每一个 TNC过程; 所述 TNC接入点为每一对 TNC客户端—— TNC接 入点本地创建一个网络连接标识, 用于标识每一个 TNC过程; 在一个 TNC 过程中, 所述 TNC客户端、 所述 TNC接入点和评估策略服务者首先执行一 次平台鉴别过程, 若该次平台鉴别过程后通过进行平台修补, 或者评估策略 发生了改变, 则所述 TNC客户端、 所述 TNC接入点和评估策略服务者通过 重新执行一次平台鉴别过程, 所述 TNC客户端和所述 TNC接入点保持上述 创建的网络连接标识不变, 直至该 TNC过程被终止。
7、 根据权利要求 1所述的三元对等鉴别可信网络连接架构的实现方法, 其特征在于: 所述步骤 13和步骤 14中的平台鉴别协议的实现方法是由所述 TNC客户端、 所述 TNC接入点和评估策略服务者执行的三元对等鉴别协议, 其中所述 TNC客户端和所述 TNC接入点互相请求对方平台的完整性度量值, 所述 TNC客户端和所述 TNC接入点仅验证对方平台的完整性度量值的平台 签名, 而平台身份证书的有效性验证和完整性度量值的评估由评估策略服务 者来冗成。
8、 根据权利要求 1所述的三元对等鉴别可信网络连接架构的实现方法, 其特征在于: 所述步骤 13中的平台鉴别协议管理机制的实现方法是: 在一次 平台鉴别过程中, TNC客户端、 TNC接入点和评估策略服务者可能通过执行 多轮平台鉴别协议, 其中, 在每一轮平台鉴别协议中所述 TNC客户端和所述 TNC接入点互相发送请求对方平台的完整性度量参数, 而向评估策略服务者 发送的是已完成度量的完整性度量参数, 本轮平台鉴别协议完成后, 若请求 度量的完整性度量参数与已完成度量的完整性度量参数不相同, 则所述 TNC 客户端、 所述 TNC接入点和评估策略服务者通过执行另外一轮平台鉴别协 议, 否则本次平台鉴别过程已成功完成。
9、 根据权利要求 1所述的三元对等鉴别可信网络连接架构的实现方法, 其特征在于:所述步骤 13和步骤 14中的对完整性度量层消息的封装机制为: 由消息类型、 完整性收集者标识和完整性度量层消息构成的封装格式进行封 装。
10、根据权利要求 1所述的三元对等鉴别可信网络连接架构的实现方法, 其特征在于: 所述步骤 14中的评估策略动态分发机制是所述 TNC接入点向 评估策略服务者请求对访问请求者的评估策略, 评估策略服务者返回对访问 请求者的评估策略给所述 TNC接入点。
11、根据权利要求 1所述的三元对等鉴别可信网络连接架构的实现方法, 其特征在于:所述步骤 15中的访问请求者中的 IF-IMC需定义的功能函数为: 所述 TNC客户端发现、 装载访问请求者中的 IMC; 所述 TNC客户端初始化 访问请求者中的 IMC; 访问请求者中的 IMC向所述 TNC客户端报告所支持 的消息类型; 所述 TNC客户端向访问请求者中的 IMC通告网络连接状态; 所述 TNC客户端向访问请求者中的 IMC通告请求度量的完整性度量参数; 访问请求者中的 IMC向所述 TNC客户端发送完整性度量层消息; 访问请求 者中的 IMC向所述 TNC客户端提供完整性度量值中的 PCR引用数据, 包括 引用的平台配置寄存器 PCR值和对这些引用 PCR值的平台签名; 所述 TNC 客户端向访问请求者中的 IMC 通告该轮平台鉴别协议的该步骤消息将要发 送, 让访问请求者中的 IMC停止收集完整性度量值; 所述 TNC客户端向访 问请求者中的 IMC发送已收到的完整性度量层消息; 所述 TNC客户端终止 访问请求者中的 IMC; 访问请求者中的 IMC向所述 TNC客户端请求重新执 行完整性握手。
12、根据权利要求 1所述的三元对等鉴别可信网络连接架构的实现方法, 其特征在于: 所述步骤 15中的访问控制器中的所述 IF-IMC需定义的功能函 数为: 所述 TNC接入点发现、 装载访问控制器中的 IMC; 所述 TNC接入点 初始化访问控制器中的 IMC; 访问控制器中的 IMC向所述 TNC接入点 4艮告 所支持的消息类型; 所述 TNC接入点向访问控制器中的 IMC通告网络连接 状态; 所述 TNC接入点向访问控制器中的 IMC通告请求度量的完整性度量 参数; 访问控制器中的 IMC向所述 TNC接入点发送完整性度量层消息; 访 问控制器中的 IMC向所述 TNC接入点提供完整性度量值中 PCR引用数据, 包括引用的 PCR值和对这些 I用 PCR值的平台签名; 所述 TNC接入点向访 问控制器中的 IMC通告该轮平台鉴别协议的该步骤消息将要发送, 让访问控 制器中的 IMC停止收集完整性度量值; 所述 TNC接入点向访问控制器中的 IMC发送已收到的完整性度量层消息; TNC接入点终止访问控制器中的 IMC; 访问控制器中的 IMC向所述 TNC接入点请求重新执行完整性握手。
13、根据权利要求 1所述的三元对等鉴别可信网络连接架构的实现方法, 其特征在于: 所述步骤 16中的 IF-IMV通过定义的功能函数为: 评估策略服 务者发现、 装载策略管理器中的完整性校验者 IMV; 评估策略服务者初始化 策略管理器中的所述 IMV;策略管理器中的所述 IMV向评估策略服务者报告 所支持的消息类型; 评估策略服务者向策略管理器中的所述 IMV通告本轮平 台鉴别协议所通过设置的评估策略; 评估策略服务者向策略管理器中的所述 IMV发送已收到的完整性度量层消息;策略管理器中的所述 IMV向评估策略 服务者发送完整性度量层消息; 策略管理器中的所述 IMV向评估策略服务者 提供完整性度量值中 PCR引用数据, 包括引用的 PCR值和对这些引用 PCR 值的平台签名;策略管理器中的 IMV向评估策略服务者提供组件级评估结果; 评估策略服务者终止策略管理器中的 IMV。
14、根据权利要求 1所述的三元对等鉴别可信网络连接架构的实现方法, 其特征在于: 所述步骤 17中的 IF-IM的封装方法为: 与所述 TCG-TNC架构 中 IF-M的封装方法相同。
15、根据权利要求 1所述的三元对等鉴别可信网络连接架构的实现方法, 其特征在于: 所述步骤 24中, 当所述 TNC客户端收到所述 IF-TNCCAP和所 述 IF-EPS中定义的平台鉴别协议消息时, 通过检查所述 TNC客户端是否已 装载和初始化访问请求者中的 IMC,若所述 TNC客户端还没有装载和初始化 访问请求者中的 IMC, 则利用访问请求者中 IF-IMC定义的功能函数载装和 初始化访问请求者中的 IMC; 当所述 TNC接入点收到 IF-TNCCAP和 IF-EPS 中定义的平台鉴别协议消息时,通过检查所述 TNC接入点是否已装载和初始 化访问控制器中的 IMC,若所述 TNC接入点还没有装载和初始化访问控制器 中的 IMC, 则利用访问控制器中 IF-IMC定义的功能函数载装和初始化访问 控制器中的 IMC; 当评估策略服务者收到 IF-TNCCAP和 IF-EPS中定义的平 台鉴别协议消息时, 通过检查评估策略服务者是否已装载和初始化策略管理 器中的 IMV, 若评估策略服务者还没有装载和初始化策略管理器中的 IMV, 则利用策略管理器中 IF-IMV 定义的功能函数载装和初始化策略管理器中的 IMV。
16、根据权利要求 1所述的三元对等鉴别可信网络连接架构的实现方法, 其特征在于: 所述步骤 24中, 所述 TNC客户端、 所述 TNC接入点和所述评 估策略服务者可执行 IF-TNCCAP和 IF-EPS中定义的平台鉴别协议, 其中平 台鉴别协议数据利用 IF-TNT和 IF-APS中定义的网络传输协议进行传输, 评 估策略服务者通过为每一轮平台鉴别协议或每一次平台鉴别过程创建一个会 话标识来实现区分。
17、根据权利要求 1所述的三元对等鉴别可信网络连接架构的实现方法, 其特征在于: 所述步骤 24中, 平台鉴别过程完成后, 所述 TNC客户端可根 据平台鉴别过程中各轮平台鉴别协议中的平台鉴别结果做出访问决策并发送 给网络访问请求者;所述 TNC接入点可根据平台鉴别过程中各轮平台鉴别协 议中的平台鉴别结果做出访问决策并发送给网络访问控制者, 或者评估策略 服务者可根据平台鉴别过程中各轮平台鉴别协议中的平台鉴别结果做出访问 决策并发送给所述 TNC接入点, 然后所述 TNC接入点发送给网络访问控制 者;网络访问请求者和网络访问控制者利用 IF-TNT中定义的访问控制方法执 行访问控制。
18、根据权利要求 1至 17任一权利要求所述的三元对等鉴别可信网络连 接架构的实现方法, 其特征在于: 所述步骤 2中, 对于三元对等鉴别可信网 络连接架构中的各个组件, 被装载或服务启用时被执行完整性校验, 以确定 这些组件处于可信赖状态。
PCT/CN2009/075697 2009-04-16 2009-12-18 一种三元对等鉴别可信网络连接架构的实现方法 WO2010118613A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2009100220570A CN101527717B (zh) 2009-04-16 2009-04-16 一种三元对等鉴别可信网络连接架构的实现方法
CN200910022057.0 2009-04-16

Publications (1)

Publication Number Publication Date
WO2010118613A1 true WO2010118613A1 (zh) 2010-10-21

Family

ID=41095415

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/075697 WO2010118613A1 (zh) 2009-04-16 2009-12-18 一种三元对等鉴别可信网络连接架构的实现方法

Country Status (2)

Country Link
CN (1) CN101527717B (zh)
WO (1) WO2010118613A1 (zh)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101527717B (zh) * 2009-04-16 2012-11-28 西安西电捷通无线网络通信股份有限公司 一种三元对等鉴别可信网络连接架构的实现方法
CN101527718B (zh) 2009-04-16 2011-02-16 西安西电捷通无线网络通信股份有限公司 一种建立三元对等鉴别可信网络连接架构的方法
CN101540676B (zh) 2009-04-28 2012-05-23 西安西电捷通无线网络通信股份有限公司 一种适合三元对等鉴别可信网络连接架构的平台鉴别方法
CN101662410B (zh) * 2009-09-22 2012-07-04 西安西电捷通无线网络通信股份有限公司 一种基于隧道技术的三元鉴别可扩展方法及其系统
CN103780395B (zh) * 2014-01-24 2017-11-10 广东电网公司电力科学研究院 网络接入证明双向度量的方法和系统
CN113407947A (zh) * 2021-06-23 2021-09-17 航天科工智能运筹与信息安全研究院(武汉)有限公司 一种云环境下面向移动终端用户的可信连接验证方法

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1976338A (zh) * 2006-12-18 2007-06-06 西安西电捷通无线网络通信有限公司 一种三元结构的对等访问控制系统
CN101136928A (zh) * 2007-10-19 2008-03-05 北京工业大学 一种可信网络接入框架
CN101159660A (zh) * 2007-11-16 2008-04-09 西安西电捷通无线网络通信有限公司 一种基于三元对等鉴别的可信网络接入控制方法
CN101242266A (zh) * 2007-08-01 2008-08-13 西安西电捷通无线网络通信有限公司 一种基于三元对等鉴别的可信网络连接方法
CN101345766A (zh) * 2008-08-21 2009-01-14 西安西电捷通无线网络通信有限公司 一种基于三元对等鉴别可信网络连接的可信网络管理方法
US20090077631A1 (en) * 2007-09-13 2009-03-19 Susann Marie Keohane Allowing a device access to a network in a trusted network connect environment
CN101527717A (zh) * 2009-04-16 2009-09-09 西安西电捷通无线网络通信有限公司 一种三元对等鉴别可信网络连接架构的实现方法

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100566251C (zh) * 2007-08-01 2009-12-02 西安西电捷通无线网络通信有限公司 一种增强安全性的可信网络连接方法
CN100566252C (zh) * 2007-08-03 2009-12-02 西安西电捷通无线网络通信有限公司 一种基于三元对等鉴别的可信网络连接系统
CN100512313C (zh) * 2007-08-08 2009-07-08 西安西电捷通无线网络通信有限公司 一种增强安全性的可信网络连接系统
CN100553212C (zh) * 2007-11-16 2009-10-21 西安西电捷通无线网络通信有限公司 一种基于三元对等鉴别的可信网络接入控制系统
CN101345660B (zh) * 2008-08-21 2010-06-09 西安西电捷通无线网络通信有限公司 一种基于tcpa/tcg可信网络连接的可信网络管理方法

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1976338A (zh) * 2006-12-18 2007-06-06 西安西电捷通无线网络通信有限公司 一种三元结构的对等访问控制系统
CN101242266A (zh) * 2007-08-01 2008-08-13 西安西电捷通无线网络通信有限公司 一种基于三元对等鉴别的可信网络连接方法
US20090077631A1 (en) * 2007-09-13 2009-03-19 Susann Marie Keohane Allowing a device access to a network in a trusted network connect environment
CN101136928A (zh) * 2007-10-19 2008-03-05 北京工业大学 一种可信网络接入框架
CN101159660A (zh) * 2007-11-16 2008-04-09 西安西电捷通无线网络通信有限公司 一种基于三元对等鉴别的可信网络接入控制方法
CN101345766A (zh) * 2008-08-21 2009-01-14 西安西电捷通无线网络通信有限公司 一种基于三元对等鉴别可信网络连接的可信网络管理方法
CN101527717A (zh) * 2009-04-16 2009-09-09 西安西电捷通无线网络通信有限公司 一种三元对等鉴别可信网络连接架构的实现方法

Also Published As

Publication number Publication date
CN101527717A (zh) 2009-09-09
CN101527717B (zh) 2012-11-28

Similar Documents

Publication Publication Date Title
JP5248621B2 (ja) 3値同等識別に基づく、信頼されているネットワークアクセス制御システム
JP5259724B2 (ja) 3エレメントピア認証に基づく信頼されているネットワークアクセス制御方法
WO2010118610A1 (zh) 建立三元对等鉴别可信网络连接架构的方法
US8255977B2 (en) Trusted network connect method based on tri-element peer authentication
CA2573171C (en) Host credentials authorization protocol
US8191113B2 (en) Trusted network connect system based on tri-element peer authentication
US8931049B2 (en) Trusted network connection implementing method based on tri-element peer authentication
US20120240211A1 (en) Policy-based authentication
US20160308849A1 (en) System and Method for Out-of-Ban Application Authentication
US9246942B2 (en) Platform authentication strategy management method and device for trusted connection architecture
EP2357771A1 (en) Trusted network connect handshake method based on tri-element peer authentication
WO2010118613A1 (zh) 一种三元对等鉴别可信网络连接架构的实现方法
WO2009018743A1 (fr) Système de connexion à un réseau de confiance destiné à améliorer la sécurité
WO2018191854A1 (zh) 接入固定网络的方法和接入网关网元
WO2010020188A1 (zh) 一种基于tcpa/tcg可信网络连接的可信网络管理方法
WO2010020187A1 (zh) 一种基于三元对等鉴别可信网络连接的可信网络管理方法
WO2009115029A1 (zh) 一种修复数据的方法、系统和装置
JP2012529795A (ja) 3要素ピア認証信頼可能ネットワークアクセスアーキテクチャーに適するアクセス制御方法
WO2011109959A1 (zh) 一种适合可信连接架构的平台鉴别实现方法及系统
WO2010121474A1 (zh) 一种适合三元对等鉴别可信网络连接架构的平台鉴别管理方法
WO2011069355A1 (zh) 一种适合三元对等鉴别可信网络连接架构的网络传输方法
US8949598B2 (en) Method and apparatus for secured embedded device communication
WO2011022902A1 (zh) 一种可实现双向平台鉴别的方法
TWI755951B (zh) 通訊系統及通訊方法
WO2012062129A1 (zh) 一种适合可信连接架构的网络传输方法和访问控制器

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09843247

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09843247

Country of ref document: EP

Kind code of ref document: A1