A kind of portable terminal trustable network cut-in method and system
Technical field
The invention belongs to trustable network access technology field, relate in particular to cut-in method and the connecting system of a kind of portable terminal in trustable network.
Background technology
Along with mobile device, mobile network's continual renovation and development, mobile phone has become the indispensable part of the human modern life.Mobile network's quick growth has also brought a lot of new security challenges when having introduced a lot of new notions and technology.For example many employees are in and have downloaded some Malwares (wooden horse, virus etc.) when using mobile device (mobile phone, PDA, panel computer, notebook computer etc.) online accidentally.When they possibly are used to steal or the secret resource of dilapidated company during with these mobile device Connected Corp. network by the third party, these Malwares also might be transmitted in company's network simultaneously.Therefore; When the mobile terminal request network insertion; The network insertion control appliance also hopes to verify user's platform identity except the terminal is carried out traditional authenticating user identification, confirms to operate in the protection that terminal on the specific platform has received certain safe practice; Thereby set up certain of user is trusted, receive the threat of infected with malware to prevent portable terminal that the network insertion control appliance contains Malware because of access; Similarly, the user also hopes to verify the platform identity of network insertion control appliance, receives threats such as infected with malware, leakage privacy data to prevent the network insertion control appliance that contains Malware because of access.Therefore, realize that the platform authentication between the machine to machine is necessary.
Simultaneously the network insertion control appliance hopes to verify whether the virus base, system mend, operating software integrity check value etc. of user's operating system version, antivirus software reach safety requirements; Thereby set up certain trusting relationship; Believe that the portable terminal that request inserts operates in the appropriate environments really, does not receive the attack of virus and wooden horse.
Therefore, the access of control portable terminal in trusted networks, the safety issue that the guarding network office brings becomes the previous problem demanding prompt solution of order.
Summary of the invention
To the technical problem that exists in the prior art, the purpose of this invention is to provide the method for security verification when portable terminal inserts in a kind of trustable network, access strategy decision and implementation strategy.This method is carried out the policy validation of running of mobile terminal situation; The operation conditions of guaranteeing the terminal of access network meets the regulation of relevant operation conditions strategy in the network access policies, and limits the abnormal portable terminal of operation conditions selectively and only just can conduct interviews after normal recovering.
According to above purpose, realize that a concrete scheme of the present invention is: have three typical entities of participating in---portable terminal, accessing control server and access strategy server that request inserts at least.
The processing procedure of portable terminal trustable network access technology comprises the steps:
1. portable terminal sends the network insertion request to accessing control server;
2. after accessing control server is received the network insertion request, send the network insertion decision request to the access strategy server;
3. after the access strategy server is received decision request, checking mobile terminal user identity (conventional authentication methods such as user name, password);
4. after the mobile terminal user authentication is passed through, begin to carry out the platform authentication between access strategy server and the portable terminal;
5. portable terminal and access strategy server send message each other, verify both sides' system integrity each other.The access strategy server sends system integrity checking request to portable terminal; Request content comprises operating system version, the system mend situation moved on the portable terminal, whether Malware etc. is arranged; The system integrity that the result who returns according to portable terminal measures portable terminal is set up the trust of access strategy server for portable terminal thus; Same; Portable terminal sends system integrity checking request to the access strategy server; Request content comprises operating system version, system mend situation etc.; The result who returns according to the access strategy server measures its system integrity, sets up the trust of portable terminal for the access strategy server thus.After the verification system integrality finishes each other, just set up portable terminal and access strategy server both sides' platform trusting relationship.
6. the access strategy server sends the suggestion that whether inserts according to checking result (the platform trusting relationship of promptly setting up) to accessing control server, and accessing control server advises that according to this permission, refusal or part are authorized the mobile terminal network access rights.
Before portable terminal sent the network insertion request, deployment was connected the integrality (prevent to be written into the IMC that suffers that Malware is forged, distorted, guarantee the credibility of IMC) that client is written into IMC and detects IMC with the trustable network of portable terminal; Same, the credible Connection Service device end of access strategy server loads integrity verification person IMV, and checking integrity verification person's integrality (adopt the modes such as hashed value of verification IMV, guarantee that IMV is not by malicious modification).
The method of said portable terminal and access strategy server authentication both sides' system integrity is:
Integrality gatherer on A, the portable terminal reports to the trustable network connection client TNCC on the portable terminal with the configuring condition (like type of message, information gathering ability and the scope etc. that IMC supported) of IMC self;
Integrity verification person on B, the access strategy server reports to the credible Connection Service device end TNCS on the access strategy server with the configuring condition (like type of message, measure information ability and the scope etc. that IMV supported) of IMV self;
C, credible Connection Service device end TNCS are with the information of the integrality gatherer IMC person IMV that issues the integrity verification; The integrality of integrity verification person IMV checking integrality gatherer IMC; And through credible Connection Service device end and integrality gatherer IMC switching plane authentication message, a series of integrity value of the access strategy server that the concrete request of the collection access strategy server system integrality that a series of integrity value (like operating system version and patch information etc.) of this portable terminal that the request of collecting is collected according to integrality that the concrete request (operating system version of collecting portable terminal like request with patch information etc.), IMC that both sides' interactive messages comprises the collection mobile terminal system integrality that IMV sends to IMC returned to IMV, IMC are sent to IMV, the collection according to integrality that IMV returns to IMC ask to collect;
D. integrity verification person IMV is according to a series of integrity value about portable terminal of integrality gatherer IMC collection, and whether the system integrity of checking portable terminal is to allowing the portable terminal access to make IMV action suggestion; The a series of system integrities about the access strategy server that integrality gatherer IMC collects according to integrity verification person IMV confirm whether the access strategy server can trust.
Integrity verification person IMV sends IMV action suggestion to credible Connection Service device end TNCS; IMV action suggestion can be " allowing to insert ", " allowing to insert the subnetwork resource ", " refusal inserts; isolate portable terminal " etc.; TNCS forms TNCS access suggestion according to IMV action suggestion and the security strategy of self, and carries out TNCS and insert suggestion, the completion access process.
The present invention also provides the connecting system of portable terminal in a kind of trustable network, comprises portable terminal AR, accessing control server PEP and access strategy server PDP, and portable terminal sends the network insertion request; The platform identity and the completeness of platform of access strategy server authentication portable terminal judge whether the running status of portable terminal satisfies the network insertion strategy; Accessing control server allows, refuses according to the judged result of access strategy server or part is authorized the mobile terminal network access rights.
Said portable terminal comprises integrality gatherer (IMC; Integrity Measurement Collector Interface), trustable network connects client (TNCC; Trusted Network Connect Client) and network insertion requestor (NAR, Network Access Requestor); Trustable network connects client and is connected with the access strategy server, receives the integrity value of integrality gatherer transmission and send to the access strategy server to verify; The network insertion requestor sends the request of access to accessing control server.
Said accessing control server comprises network insertion strategy execution parts, and network insertion strategy execution parts are handled the network insertion request of portable terminal according to the judged result of access strategy server.
Said access strategy server comprises integrity verification person, credible Connection Service device end and network insertion authorization module; The integrity verification person verifies the integrity value of portable terminal; Credible Connection Service device end is provided with the platform identity and the completeness of platform state of network insertion strategy, checking portable terminal, and provides the network insertion suggestion; The network insertion authorization module receives the suggestion of credible Connection Service device end transmission and is transported to accessing control server.
Compared with prior art, good effect of the present invention is:
The invention has the advantages that, two-way platform authentication is provided, AR and PDP can verify the other side's platform evidence of identity and integrality state each other.Completeness of platform through the checking both sides is set up the trusting relationship between AR and the PDP.PDP is the define grid access strategy independently; PDP can take assessment, isolation and corrective action to AR; When the environment of network access request person's end points machine can not reach trust in the access control safety strategy and requires; The network access authority that will be authorized part go to visit one independently network (both can make be physically independently network also can be network independently in logic), this independently network will allow them through the necessary assembly of access control policy for they provide enough connections to download, install and upgrade.Through above measure, portable terminal trustable network access technology can be good at guaranteeing that Internet resources are protected.
Description of drawings
Fig. 1 is a portable terminal trustable network connecting system structural representation block diagram;
Fig. 2 is the flow chart of portable terminal trustable network cut-in method.
Embodiment
Below in conjunction with the concrete elaboration of accompanying drawing portable terminal trustable network access technology of the present invention.
As shown in Figure 1, portable terminal trustable network connecting system comprises portable terminal, accessing control server and the access strategy server that request inserts.
1. send the portable terminal (AR of the request of access; Access Requestor); Be connected with PEP through wireless, it is equipped with network insertion commonly used usually and brings in the general network access mode of support, like 802.1x; The AR deploy has integrality gatherer (IMC; Integrity Measurement Collector Interface), trustable network connects client (TNCC, Trusted Network Connect Client) and network insertion requestor (NAR, Network Access Requestor).
2. network access equipment (PEP, Policy Enforcement Point), for example AP, vpn gateway etc. need to support 802.1x and VPN access way commonly used.The PEP deploy has network insertion strategy execution parts (NAE, Network Access Enforcer).
3. access strategy server (PDP, Policy Decision Point), PDP be with determining whether allowing AR to insert, and PDP is RADIUS and Diameter server normally.The PDP deploy has integrity verification person (IMV; Integrity Measurement Verifiers), credible Connection Service device end (TNCS; Trusted Network Connect Server) and network insertion authorization server (NAA, Network Access Authority).
Portable terminal trustable network access technology logically is divided into three levels (from top to bottom):
Ground floor: integrality collection/checking layer.IMC and IMV be in the work of this level, operates in the integrity value that modes such as configuration file through reading portable terminal of IMC on the portable terminal, scanning executable file are collected portable terminal, and submit to IMV and verify.Integrity verification person IMV collects the integrity value of access strategy server, and submits to IMC and verify through the configuration file, the scanning executable file mode that read the access strategy server.
The second layer: integrity assessment layer.TNCC and TNCS are in this level work; Whether the numerical value of expecting during TNCC is responsible for initialization and loads IMC, system integrity value and inherently safe strategy through TNCS relatively is identical; Verify the connection between TNCS platform identity and integrality state, management and the TNCS, the portable terminal integrity measurement value that reception IMC sends, and it is transmitted to TNCS.Whether platform identity and completeness of platform state, the integrity measurement value of checking AR, the running status of assessment AR that TNCS comprises network insertion strategy (like " allowing to insert ", " allowing to insert the subnetwork resource ", " refusal inserts, and isolates portable terminal " etc.), checking AR satisfy the network insertion strategy and provide the TNCS suggestion.
The 3rd layer: network access layer.NAR, NAE and NAA are in this layer work, and NAE is responsible for communicating by letter with NAA, and NAE is responsible for transmitting access message to NAA, and NAA receives the TNCS suggestion and sends to NAE and carries out.
As shown in Figure 2, the concrete implementation of portable terminal trustable network cut-in method is following:
1. move and insert the client and server initialization:
TNCC is written into IMC and detects the integrality of IMC and (prevents to be written into the IMC that suffers that Malware is forged, distorted; Guarantee the credibility of IMC); TNCS is written into IMV and detects the integrality of IMV (prevent to be written into the IMV that suffers that Malware is forged, distorted, guarantee the credibility of IMV).IMC and IMV show as a dynamic link libraries (like dll file, so file or jar file).After the completeness check success, system is ready, can initiate to insert request.
2.AR NAR send the network insertion request message to PEP:
The form of network insertion request message is following:
Wherein, Username is a user name, is the character string with 0 ending.The user of expression current request access network.Password refers to user password, is the character string with 0 ending equally.IDNum refers to the Property ID number, and AttID refers to Property ID, and expression current request platform can provide the Property ID of integrity report.
The mode that move to insert the webservice that communicating by letter between client and the server provide with the invoking server end realizes.Webservice defines as follows:
TNCC calls this web service and TNCS exchanges messages; Connection representes unique indications of current access; Term_address representes to insert the IP of portable terminal; Tnc_message_in representes that trustable network to be transmitted inserts message, and tnc_message_out representes that the trustable network of receiving inserts message.
3.PEP after receiving the network requests message that NAR sends, PEP sends the network insertion decision request to NAA.After NAA received the network insertion decision request that PEP sends, the identity of checking AR was if the authenticated failure then directly requires the network connecting request of PEP refusal AR.
4.TNCC and accomplish platform authentication and completeness of platform state verification between the TNCS, and notify the new network connecting request that is connected of IMC and IMV to begin respectively.
5.TNCS the information of IMC is issued IMV, and IMV verifies the integrality of IMC, and exchanges messages through TNCS and IMC.The message that TNCC sends TNCS is passed to suitable IMC, and IMC verifies the integrality of IMV, and exchanges messages through TNCC and IMV, and the portable terminal AR system integrity information of then AMC being collected sends to IMV.Both sides' interactive messages comprises the concrete request (collecting operating system version and the patch information of portable terminal etc. like request) of the collection mobile terminal system integrality that IMV sends to IMC; A series of integrity value (like operating system version and patch information etc.) of this portable terminal that the request of collecting is collected according to integrality that IMC returns to IMV; The concrete request of the collection access strategy server system integrality that IMC sends to IMV; A series of integrity value of the access strategy server that the request of collecting is collected according to integrality that IMV returns to IMC.When the IMV decision provides IMV action suggestion (like " allowing to insert ", " allowing to insert the subnetwork resource ", " refusal inserts; isolate portable terminal " etc.); IMV passes to TNCS with message; TNCS forms TNCS access suggestion according to IMV action suggestion and the security strategy of self, and carries out TNCS and insert suggestion, the completion access process.
The data structure of mobile terminal system integrity properties ID comprises: integrity properties Id, integrity properties length, integrity properties value, and its form is following:
Wherein the value of 32 digital id is used to represent an integrity properties to be collected.The length of the integrity value that length refers to collect, value is the integrity value of collecting.
6.TNCS the TNCS suggestion is made in suggestion according to IMV, and gives NAA with TNCS suggestion notice.NAA allows, refuses according to TNCS suggestion decision or part is authorized AR network access authority, and NAA notifies final decision to PEP.NAA communicates through the WebService that calls PEP and provide, and WebService defines as follows:
Wherein, the terminal IP that term_address refers to an access, allowed refer to allow the IP and the port list that insert.
Although disclose specific embodiment of the present invention and accompanying drawing for the purpose of illustration; Its purpose is to help to understand content of the present invention and implement according to this; But it will be appreciated by those skilled in the art that: in the spirit and scope that do not break away from the present invention and appended claim, various replacements, variation and modification all are possible.Therefore, the present invention should not be limited to most preferred embodiment and the disclosed content of accompanying drawing, and the scope that the present invention requires to protect is as the criterion with the scope that claims define.