作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2007, Vol. 33 ›› Issue (12): 160-162,. doi: 10.3969/j.issn.1000-3428.2007.12.056

• 安全技术 • 上一篇    下一篇

基于TNC的安全认证协议的设计与实现

颜 菲,任江春,戴 葵,王志英   

  1. (国防科学技术大学计算机学院,长沙 410073)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2007-06-20 发布日期:2007-06-20

Design and Implementation of Secure Authenticated Protocol Based on TNC

YAN Fei, REN Jiangchun, DAI Kui, WANG Zhiying   

  1. (School of Computer Science, National University of Defense Technology, Changsha 410073)
  • Received:1900-01-01 Revised:1900-01-01 Online:2007-06-20 Published:2007-06-20

摘要: 安全协议是保证网络安全的基础,现有安全协议为服务器和网络提供了很好的保护,但对客户终端缺乏保护。该文以可信网络连接(TNC)的终端完整性度量思想为基础,提出了一种基于TNC结构的安全认证协议。该协议在可信计算环境下将终端完整性度量技术与公钥基础设施(PKI)相结合使用,确保了终端平台的可信性。

关键词: 安全认证协议, TNC结构, 平台完整性认证, 用户身份认证, 终端完整性

Abstract: Network security is based on secure protocols. Secure protocols in existence have offered a favorable protection for servers and network, but there’s no protection for endpoint. A TNC (trusted network connection) based authenticated protocol, which focus on endpoint integrity, is proposed. The secure protocol, which integrates endpoint integrity measurement and PKI (public key infrastructure) under trusted computing environment, can assure the trustworthiness of endpoint.

Key words: Secure authenticated protocol, TNC architecture, Platform integrity authentication, User identity authentication, Endpoint integrity

中图分类号: