首页>
外国专利>
Method of controlling access to a trusted network based on authentication between pairs of three elements
Method of controlling access to a trusted network based on authentication between pairs of three elements
展开▼
机译:基于三个元素对之间的认证来控制对可信网络的访问的方法
展开▼
页面导航
摘要
著录项
相似文献
摘要
Method of controlling access to a trusted network based on authentication between pairs of three elements, comprising: initializing a collectors measurement reliability, TMCs, at a layer of the reliability metrics, execute an authentication protocol between pairs of three elements based on a policy manager acting as a third means for requesting access, an access controller and the policy manager at a control layer 10 access to the network for authentication bidirectional user between the requester access and the access controller; when results of user authentication indicate successful authentication, execute the authentication protocol between pairs of three elements based on the policy manager acting as a third party by requesting access, the access controller and the policy manager at a layer reliable assessment platform for evaluating the reliability of the platform bidirectional access between the applicant and the access controller; generating, by a TNAC client requesting access and server access controller, according to results of reliability evaluation platform in the process of evaluating the reliability of the platform TNAC, and transmit recommendations respectively corresponding to the applicant access and the access controller, so that the requester network access controller and the network access control mutual access ports respectively according to the recommendations; wherein the port control is carried out as follows: an uncontrolled applicant access port controls data transport user authentication and protocol negotiation session key, protocol data reliability evaluation platform and data correction server platform, and a controlled port requesting access controls data transport application service; and uncontrolled access controller port controls data transport user authentication and protocol negotiation session key, and a controlled port access controller controls data transport protocol for evaluating the reliability of the platform, data correction service platform and application service data.
展开▼