Font Size: a A A

Research On Trusted Domain Authentication Mechanism For Centralized Management Mode

Posted on:2014-05-03Degree:MasterType:Thesis
Country:ChinaCandidate:J M GuoFull Text:PDF
GTID:2268330392973699Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the development of computer technology and network, the application ofthe Internet is playing a more and more important role in our daily life, the networkbrings great convenience in the implementation of centralized storage, centralizedmanagement of information for users, but also brought the issues of informationsecurity. System of centralized control mode to solve the security problem ofinformation management, realize the secure storage of the information transmission,security, authorization control, its application is more and more widely. The trustednetwork connection architecture of our TCA is introduced into the system ofcentralized management mode, fill the blank of trusted application domain centralizedmanagement mode authentication mechanism for credible verification, it is of greatinnovation. Has the important practical significance to realize the information securitymanagement and centralized management mode.According to the demand of the security protection of electronic informationsystem of centralized control mode, analysis and research of the trusted networkconnection architecture and virtual private network technology, based on the trustednetwork connection architecture of TCA proposed by China on the implementation oftrusted network, centralized management mode is connected with the architecture oftrusted network application, will be our own the connection structure of the specificapplication, at the same time to carry on the concrete realization for informationsecurity management centralized management mode. The specific research contentsinclude the following.First, the trusted network connection between TCG TNC and China’s trustednetwork connection architecture TCA difference, build centralized management modeunder the network connection architecture, realize the centralized management mode,entity three yuan three layer peer-to-peer architecture, provide a framework for entityauthentication and protection of information, information security.Second, in the centralized management mode, in order to realize bidirectionalidentity trusted verification, the platform trusted authentication and integrityverification, design the process of information transmission basic, and in the networkaccess control layer, trusted platform evaluation layer and integrity measurement layerthree layer, information transmission process design with body.Third, according to the centralized management mode, the need for informationtransmission and flow, respectively, design of network access control layer, trusted platform to evaluate the specific protocol layer three layer on the measurement leveland integrity, for each transmission process, design of specific format and transferinformation.Fourth, combined with the project of network camera, as well as the centralizedmanagement mode of the trusted domain authentication mechanism, implementationof trusted access network camera, the specific implementation of integrity betweenbidirectional identity between the network camera and gateway verification,validation and their verification, provides the concrete realization for the networkcamera project, demonstrates the utility research on authentication mechanism of thetrusted domain.
Keywords/Search Tags:Trusted network connection architecture, Centralized management mode, TCA, Trusted verification, Network camera
PDF Full Text Request
Related items