Disclosure of Invention
On one hand, embodiments of the present invention provide a security status assessment method, which can fully protect privacy of a communication entity, enhance security of the communication entity, and improve flexibility of security status assessment.
The safety state evaluation method of the embodiment of the invention adopts the following technical scheme:
a security state assessment method, comprising:
a responder receives a communication request from a requester and information of an evaluator trusted by the requester;
according to the information of the evaluator, the response party or the request party determines the evaluators trusted by both parties;
the response party acquires a security state evaluation result of the evaluator on the request party, wherein the security state evaluation result is acquired by the evaluator according to the security state information from the request communication entity;
and the responder responds to the communication request of the requester according to the evaluation result.
According to the safety state evaluation method, the request party and the response party negotiate to determine the evaluator, the evaluator evaluates the request party according to the safety state information of the request party, and the response party responds to the request party according to the evaluation result. Compared with the prior art, the requester does not need to publish the security state information of the requester to the responder, thereby avoiding the attack of the requester due to the leakage of the security state information, fully protecting the privacy of the communication entity, enhancing the security of the communication entity and improving the flexibility of the security state evaluation.
On the other hand, embodiments of the present invention provide a network device, which can fully protect privacy of a communication entity, enhance security of the communication entity, and improve flexibility of security status evaluation.
The network equipment of the embodiment of the invention adopts the following technical scheme:
a network device, comprising:
a security status information obtaining unit for obtaining security status information of the first communication entity;
and the evaluation unit is used for evaluating the security state of the first communication entity according to the security state information, sending an evaluation result to a second communication entity communicating with the first communication entity, and responding to the evaluated communication entity by the second communication entity according to the evaluation result.
In the network device according to the embodiment of the present invention, the security status information acquiring unit acquires the security status information of the communication entity to be evaluated, the evaluating unit evaluates the security status of the first communication entity according to the security status information, and sends the evaluation result to the second communication entity, and the second communication entity responds to the evaluated communication entity according to the result. Compared with the prior art, the first communication entity does not need to publish the security state information of the first communication entity to the second communication entity, the fact that the first communication entity is attacked due to leakage of the security state information is avoided, the privacy of the communication entity is fully protected, the security of the communication entity is enhanced, and the flexibility of security state evaluation is improved.
In a third aspect, embodiments of the present invention provide a network system, which can fully protect privacy of a communication entity, enhance security of the communication entity, and improve flexibility of security status evaluation.
The network system of the embodiment of the invention adopts the following technical scheme:
a network system, comprising:
the requesting party is used for requesting the responding party to establish communication and informing the responding party of the information of the trusted evaluator of the requesting party;
the response party is used for receiving the information of the evaluator sent by the requester, determining the evaluators trusted by both parties according to the information of the evaluators, acquiring the evaluation result of the evaluator on the requester, and responding to the requester according to the evaluation result;
and the evaluator is used for acquiring the security state information of the requester and evaluating the security state of the requester to obtain an evaluation result.
In the network system of the embodiment of the invention, the request party and the response party negotiate to determine the evaluator, the evaluator evaluates the request party according to the safety state information of the request party, and the response party responds to the request party according to the evaluation result. Compared with the prior art, the requester does not need to publish the security state information of the requester to the responder, thereby avoiding the attack of the requester due to the leakage of the security state information, fully protecting the privacy of the communication entity, enhancing the security of the communication entity and improving the flexibility of the security state evaluation.
In a fourth aspect, embodiments of the present invention provide a security status evaluation method, which can fully protect privacy of a communication entity, enhance security of the communication entity, and improve flexibility of security status evaluation.
The safety state evaluation method of the embodiment of the invention adopts the following technical scheme:
a security state assessment method, comprising:
the second communication entity receives a communication request from the first communication entity and information of an evaluator trusted by the first communication entity;
according to the information of the evaluator trusted by the first communication entity, the second communication entity or the first communication entity determines a first evaluator and a second evaluator trusted by both parties;
the second communication entity obtains the evaluation result of the first evaluator on the first communication entity, and the evaluation result of the first evaluator on the first communication entity is obtained by the first evaluator according to the security state information from the first communication entity;
the second communication entity responds to the first communication entity according to the evaluation result;
the first communication entity acquires the evaluation result of a second evaluator on the second communication entity, and the evaluation result of the second evaluator on the second communication entity is acquired by the second evaluator according to the security state information from the second communication entity;
the first communication entity responds to the second communication entity according to the evaluation result.
In the security state evaluation method of the embodiment of the invention, the first communication entity and the second communication entity collaborate to determine respective evaluators, each evaluators evaluates the communication entity according to the security state information of the communication entity evaluated by the evaluators, and the two communication entities respond to the opposite communication entity according to the evaluation result. Compared with the prior art, the two communication entities do not need to publish the own security state information to the opposite side communication entity, the attack on the communication entities caused by the leakage of the security state information is avoided, the privacy of the communication entities is fully protected, the security of the communication entities is enhanced, and the flexibility of security state evaluation is improved.
In a fifth aspect, embodiments of the present invention provide a network system, which can fully protect privacy of a communication entity, enhance security of the communication entity, and improve flexibility of security status evaluation.
The network system of the embodiment of the invention adopts the following technical scheme:
a network system, comprising:
the first communication entity is used for sending a communication request to the second communication entity, informing the second communication entity of the information of the self-trusted evaluator, acquiring the evaluation result of the second evaluator on the second communication entity, and responding to the second communication entity according to the evaluation result;
the second communication entity is used for receiving the information of the evaluator from the first communication entity, determining the first evaluator and the second evaluator which are trusted by both parties according to the information of the evaluator trusted by the first communication entity, acquiring the evaluation result of the first evaluator on the first communication entity, and responding to the first communication entity according to the evaluation result;
the first evaluator is used for acquiring the safety state information of the first communication entity and evaluating the safety state of the first communication entity to obtain an evaluation result;
and the second evaluator is used for acquiring the security state information of the second communication entity and evaluating the security state of the second communication entity to obtain an evaluation result.
In the network system of the embodiment of the invention, the first communication entity and the second communication entity collaborate determine respective evaluators, each evaluators evaluates the communication entity according to the safety state information of the communication entity evaluated by the evaluators, and the two communication entities respond to the opposite communication entity according to the evaluation result. Compared with the prior art, the two communication entities do not need to publish the own security state information to the opposite side communication entity, the attack on the communication entities caused by the leakage of the security state information is avoided, the privacy of the communication entities is fully protected, the security of the communication entities is enhanced, and the flexibility of security state evaluation is improved.
Detailed Description
In order to solve the problem that privacy of a terminal cannot be protected when the terminal is evaluated in the prior art, embodiments of the present invention provide a security state evaluation method, a network device, and a network system.
In order to make the advantages of the technical solutions of the present invention clearer, the present invention is described in detail below with reference to the accompanying drawings and examples.
In all the following embodiments of the present invention, the security status information includes version information of an operating system installed in the communication entity, patch information, firewall version information, antivirus software version information, browser version information, or the like.
In all the following embodiments of the present invention, the types of the requesting party, the responding party, and the communication entity may be a mobile phone, a PDA, a computer, a server, a home appliance, various network devices (such as a network server or a service provider or an application server), an electronic device or a computer-related device, and the like.
In all the following embodiments of the present invention, the type of the network may be a mobile network, a fixed network, a mobile-fixed converged network, a local area network, a metropolitan area network, a wide area network, a peer-to-peer network (P2P), a client/server architecture network (C/S), and the like.
In all the following embodiments of the present invention, the communication request may be a communication request of each layer of the network, including an access request of a physical layer and a link layer, and a service or service request of an application layer.
Embodiments of the present invention provide a security state assessment method, which can fully protect privacy of a communication entity, enhance security of the communication entity, and improve flexibility of security state assessment.
As shown in fig. 1, the security state evaluation method includes:
step 101: a responder receives a communication request from a requester and information of an evaluator trusted by the requester; the communication request and the information of the evaluator can be packaged in the same message or can be packaged and sent respectively;
step 102: according to the information of the evaluator, the response party or the request party determines the evaluators trusted by both parties;
the process by which the responder or requester determines the evaluator that both parties trust may be: the information of the evaluators comprises a plurality of selectable evaluators, and the response party selects and determines evaluators trusted by both parties; or, the response party informs the request party of the self-trusted evaluator, and the request party selects the evaluators trusted by both parties;
step 103: the response party acquires a safety state evaluation result of the evaluator on the request party, and the safety state evaluation result is acquired by the evaluator according to the safety state information from the request party;
step 104: and the responder responds to the communication request of the requester according to the evaluation result.
According to the safety state evaluation method, the request party and the response party negotiate to determine the evaluator, the evaluator evaluates the request party according to the safety state information of the request party, and the response party responds to the request party according to the evaluation result. Compared with the prior art, the requester does not need to publish the security state information of the requester to the responder, thereby avoiding the attack on the requester due to the leakage of the security state information, fully protecting the privacy of the communication entity, enhancing the security of the communication entity and improving the flexibility of security state evaluation.
The security status evaluation method is described in detail below with reference to specific embodiments.
The first embodiment is as follows:
in this embodiment, a requesting party a requests a network service from a responding party B, after negotiation between both parties, B selects an evaluator C trusted by both parties, and the evaluator C evaluates the security status information of the requesting party a. As shown in fig. 2, the specific implementation process of this embodiment includes the following steps:
step 201: the requester A requests the network service from the responder B, and simultaneously the requester A informs the responder B of the information of the evaluator C, D, E trusted by the requester A;
wherein the network service is web browsing or accessing a network domain managed by the responder B.
The requesting party a may send the name of the evaluator to the responding party B in a list manner, or may send the identifier of the evaluator, such as an IP address, a MAC address, and a device identifier, to the responding party B.
Step 202: the responder B directly selects an evaluator C trusted by both parties according to the information of the evaluator C, D, E trusted by the requester A;
step 203: the evaluator C obtains the safety state information of the requester A and finishes evaluation on the requester A;
the evaluator C can evaluate the requester a in real time according to the security state information and a security policy of the evaluator C or a security policy of the responder B;
or, the evaluator C directly calls the evaluation result of the requester a stored by the evaluator C.
Step 204: the responder B obtains the evaluation result of the evaluator C on the requester A;
wherein, the responder B can directly request the evaluator C for the evaluation result of the requester A;
or the evaluator C sends the evaluation result to the requester A, and the requester A sends the evaluation result with the identifier of the evaluator C to the responder B.
Step 205: the responder B responds to the requester A according to the evaluation result;
wherein, the response of the responder B to the requester A is as follows: the responder B allows the requester A to access the network completely, or the responder B allows the requester A to access the network partially, or the responder B refuses the requester A to access the network.
Example two:
in this embodiment, a requesting party a requests a responding party B to establish communication, after negotiation between both parties, an evaluator C trusted by both parties is selected by a, and the evaluator C evaluates the security status information of the requesting party a. As shown in fig. 3, the specific implementation process of this embodiment includes the following steps:
step 301: same as step 201;
step 302: responder B informs requestor a of its trusted evaluator C, D;
step 303: the request party A selects an evaluator C trusted by both parties;
step 304: same as step 203;
step 305: same as step 204;
step 306: as in step 205.
Therefore, the safety state evaluation method can fully protect the privacy of the communication entity, enhance the safety of the communication entity and improve the flexibility of safety state evaluation.
The embodiment of the invention provides another safety state evaluation method, which can fully protect the privacy of a communication entity, enhance the safety of the communication entity and improve the flexibility of safety state evaluation.
As shown in fig. 4, the security state evaluation method includes:
step 401: the second communication entity receives a communication request from the first communication entity and information of an evaluator trusted by the first communication entity;
step 402: according to the information of the evaluator trusted by the first communication entity, the second communication entity or the first communication entity determines a first evaluator and a second evaluator trusted by both parties; the first evaluator is responsible for evaluating the security state of the first communication entity, and the second evaluator is responsible for evaluating the security state of the second communication entity.
Step 403: the second communication entity obtains the evaluation result of the first evaluator on the first communication entity, and the evaluation result of the first evaluator on the first communication entity is obtained by the first evaluator according to the security state information from the first communication entity;
step 404: the second communication entity responds to the first communication entity according to the evaluation result;
step 405: the first communication entity acquires the evaluation result of a second evaluator on the second communication entity, and the evaluation result of the second evaluator on the second communication entity is acquired by the second evaluator according to the security state information from the second communication entity;
step 406: the first communication entity responds to the second communication entity according to the evaluation result.
In the security state evaluation method of the embodiment of the invention, the first communication entity and the second communication entity collaborate to determine respective evaluators, each evaluators evaluates the communication entity according to the security state information of the communication entity evaluated by the evaluators, and the two communication entities respond to the opposite communication entity according to the evaluation result. Compared with the prior art, the two communication entities do not need to publish the own security state information to the opposite side communication entity, the attack on the communication entities caused by the leakage of the security state information is avoided, the privacy of the communication entities is fully protected, the security of the communication entities is enhanced, and the flexibility of security state evaluation is improved.
The security status evaluation method is described in detail below with reference to specific embodiments.
Example three:
in this embodiment, both the communication entity a and the communication entity B that need to communicate need to know the evaluation result of the other party, the two parties negotiate to determine that the evaluator of the communication entity a is the evaluator C and the evaluator of the communication entity B is the evaluator D, the evaluators C and D respectively complete the evaluation of the communication entity a and the communication entity B, and the two communication parties respond to the request of the other party according to the evaluation result given by the evaluators. As shown in fig. 5, the specific implementation process of this embodiment includes the following steps:
step 501: the communication entity A requests the communication entity B to establish communication, and simultaneously informs the communication entity B of information of an evaluator C, D, E trusted by the communication entity A;
the communication entity a may send the name of the evaluator to the communication entity B in a list, or may send the identifier of the evaluator, such as an IP address, a MAC address, and a device identifier, to the communication entity B.
Step 502: communication entity B informs communication entity a of its trusted evaluator C, D;
step 503: the communication entity B selects an evaluator D as an evaluator of the communication entity B;
step 504: the communication entity A selects an evaluator C as an evaluator of the communication entity A;
step 505: the evaluator C completes the evaluation of the communication entity A;
step 506: the evaluator D completes the evaluation of the communication entity B;
step 507: the communication entity B acquires the evaluation result of the evaluator C on the communication entity A;
the evaluation result is obtained by the evaluator C evaluating the communication entity A according to the safety state information of the communication entity A;
or the evaluation result is the evaluation result of the communication entity A stored by the evaluator C.
Step 508: the communication entity A acquires an evaluation result of an evaluator D on the communication entity B;
the evaluation result is obtained by evaluating the communication entity B by the evaluator D according to the safety state information of the communication entity B;
or the evaluation result is the evaluation result of the communication entity B stored by the evaluator D.
Step 509: the communication entity B responds to the communication entity A according to the evaluation result of the evaluator C to the communication entity A;
step 510: the communication entity A responds to the communication entity B according to the evaluation result of the evaluator D on the communication entity B;
step 511: A. and B, finishing bidirectional evaluation and establishing communication between the two parties.
Wherein the step 503 may be performed after the step 504; the step 505 may be executed after the step 506, or the step 505 and the step 506 may be executed simultaneously; the step 507 may be executed after the step 508, or the step 507 and the step 508 may be executed simultaneously; said step 509 may be performed after step 510.
Example four:
in this embodiment, both the communication entity a and the communication entity B that need to communicate need to know the evaluation result of the other party, after negotiation between both parties, it is determined that the evaluators of the communication entity a and the communication entity B are the same evaluator C, the evaluator C completes evaluation of the communication entity a and the communication entity B, and both communication parties respond to the request of the other party according to the evaluation result given by the evaluator C. The specific implementation process of this embodiment is similar to that of the third embodiment, and is not described herein again.
Therefore, the safety state evaluation method can fully protect the privacy of the communication entity, enhance the safety of the communication entity and improve the flexibility of the safety state evaluation of the communication entity.
The embodiment of the invention also provides network equipment which can fully protect the privacy of the communication entity, enhance the safety of the communication entity and improve the flexibility of safety state evaluation.
The network device may be a computer, a server, or implemented by software, and may be deployed at a network layer or an application layer.
As shown in fig. 6, the network device includes:
a security status information obtaining unit 601, configured to obtain security status information of a first communication entity;
an evaluating unit 602, configured to perform security status evaluation on the first communication entity according to the security status information, send an evaluation result to a second communication entity in communication with the first communication entity, and make a response to the evaluated communication entity by the second communication entity according to the evaluation result.
In the network device according to the embodiment of the present invention, the security status information obtaining unit 601 obtains the security status information of the communication entity that needs to be evaluated, the evaluating unit 602 evaluates the first communication entity according to the security status information, and sends the evaluation result to the second communication entity, and the second communication entity responds to the evaluated communication entity according to the result. Compared with the prior art, the first communication entity does not need to publish the security state information of the first communication entity to the second communication entity, the fact that the first communication entity is attacked due to leakage of the security state information is avoided, the privacy of the communication entity is fully protected, the security of the communication entity is enhanced, and the flexibility of security state evaluation is improved.
As shown in fig. 6, the network device further includes:
the storage unit 603 is configured to store an evaluation result of the evaluated communication entity.
Therefore, the network equipment of the embodiment of the invention can fully ensure the privacy of the communication entity, enhance the safety of the communication entity and improve the flexibility of safety state evaluation.
The embodiment of the invention also provides a network system which can fully protect the privacy of the communication entity, enhance the safety of the communication entity and improve the flexibility of safety state evaluation.
As shown in fig. 7, the network system includes:
the requesting party 701 is used for requesting the responding party to establish communication and informing the responding party of the information of the trusted evaluator of the requesting party;
the responder 702 is configured to receive information of an evaluator sent by the requester, determine, according to the information of the evaluator, an evaluator trusted by both parties, obtain an evaluation result of the evaluator on the requester, and respond to the requester according to the evaluation result;
the evaluator 703 is configured to obtain the security state information of the requestor, and evaluate the security state of the requestor to obtain an evaluation result.
In the network system of the embodiment of the invention, the request party and the response party negotiate to determine the evaluator, the evaluator evaluates the request party according to the safety state information of the request party, and the response party responds to the request party according to the evaluation result. Compared with the prior art, the requester does not need to publish the security state information of the requester to the responder, thereby avoiding the attack of the requester due to the leakage of the security state information, fully protecting the privacy of the communication entity, enhancing the security of the communication entity and improving the flexibility of the security state evaluation.
Wherein the evaluator 703 comprises:
a storage module 704, configured to store the evaluation result of the evaluated requester.
The storage module 704 stores the evaluated results of the requester, and the requester can directly obtain the evaluation results of the evaluator on the requester from the storage module.
Therefore, the network system of the embodiment of the invention can fully protect the privacy of the communication entity, enhance the safety of the communication entity and improve the flexibility of safety state evaluation.
The embodiment of the invention also provides another network system which can fully protect the privacy of the communication entity, enhance the safety of the communication entity and improve the flexibility of safety state evaluation.
As shown in fig. 8, the network system includes:
the first communication entity 801 is configured to send a communication request to the second communication entity, notify the second communication entity of information of an evaluator trusted by the first communication entity, obtain an evaluation result of the second evaluator on the second communication entity, and respond to the second communication entity according to the evaluation result;
the second communication entity 802 is configured to receive information of an evaluator from the first communication entity, determine, according to information of an evaluator trusted by the first communication entity, a first evaluator and a second evaluator trusted by both parties, obtain an evaluation result of the first evaluator on the first communication entity, and respond to the first communication entity according to the evaluation result;
the first evaluator 803 is configured to obtain security status information of the first communication entity, and evaluate the security status of the first communication entity to obtain an evaluation result;
the second evaluator 804 is configured to obtain the security status information of the second communication entity, and evaluate the security status of the second communication entity to obtain an evaluation result.
In the network system of the embodiment of the invention, the first communication entity and the second communication entity collaborate determine respective evaluators, each evaluators evaluates the communication entity according to the safety state information of the communication entity evaluated by the evaluators, and the two communication entities respond to the opposite communication entity according to the evaluation result. Compared with the prior art, the two communication entities do not need to publish the own security state information to the opposite side communication entity, the attack on the communication entities caused by the leakage of the security state information is avoided, the privacy of the communication entities is fully protected, the security of the communication entities is enhanced, and the flexibility of security state evaluation is improved.
Wherein the first evaluator and the second evaluator respectively comprise:
a storage module 805 for storing the evaluation result of the evaluated communication entity.
The storage module stores the evaluation result of the evaluated communication entity, and one side communication entity can directly obtain the evaluation result of the evaluator on the other side communication entity from the storage module.
Therefore, the network system of the embodiment of the invention can fully protect the privacy of the communication entity, enhance the safety of the communication entity and improve the flexibility of safety state evaluation.
All embodiments of the invention can be applied to network access services of temporary terminals in airports, coffee shops, libraries and other scenes. For example, in an airport, before a notebook, a PDA, or the like of a traveler requests access to a network management server in the airport, in order to protect privacy and security of the traveler, the traveler needs to negotiate with the network management server in the airport to determine a third-party evaluator trusted by both parties, and the third-party evaluator performs security status evaluation on the notebook, the PDA, or the like of the traveler; similarly, in order to protect the airport network management server from being attacked by an illegal access user, the airport network management server negotiates with a notebook computer, a PDA and the like of a traveler to determine a third party evaluator trusted by both parties, and the third party evaluator evaluates the security state of the airport network management server. The third-party evaluator may be a network device such as a server on a network.
The above description is only a specific implementation of the embodiments of the present invention, but the scope of the embodiments of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are also included in the scope of the present invention. Therefore, the protection scope of the embodiments of the present invention shall be subject to the protection scope of the claims.