|
计算机应用 2006
Application of trusted computing compliance in VPN
|
Abstract:
Virtual Private Network (VPN) was studied. VPN enables telecommunication, but it cannot authenticate the configuration of computers. If a computer used for VPN access was compromised, an attack could exploit it to gain unauthorized access and make endpoint insecure. When being connected to the corporate network, the computer becomes a distributor of the untrustworthy endpoint to other computers on the enterprise network. Trusted computing technology can be used to solve these problems.To guarantee the security and trustworthiness of the endpoints, network connection and communication,Trusted Platform Module (TPM) was used to bind keyed attestation to authenticate the integrity of VPN, and Trusted Network Connect (TNC) was used to authenticate the security of network connections.