Movatterモバイル変換


[0]ホーム

URL:


CN101136928A - A Trusted Network Access Framework - Google Patents

A Trusted Network Access Framework
Download PDF

Info

Publication number
CN101136928A
CN101136928ACNA2007101760914ACN200710176091ACN101136928ACN 101136928 ACN101136928 ACN 101136928ACN A2007101760914 ACNA2007101760914 ACN A2007101760914ACN 200710176091 ACN200710176091 ACN 200710176091ACN 101136928 ACN101136928 ACN 101136928A
Authority
CN
China
Prior art keywords
access
platform
network
access controller
requestor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2007101760914A
Other languages
Chinese (zh)
Other versions
CN101136928B (en
Inventor
沈昌祥
张兴
于昇
祝璐
周明
周艺华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Technology
Original Assignee
Beijing University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of TechnologyfiledCriticalBeijing University of Technology
Priority to CN2007101760914ApriorityCriticalpatent/CN101136928B/en
Publication of CN101136928ApublicationCriticalpatent/CN101136928A/en
Application grantedgrantedCritical
Publication of CN101136928BpublicationCriticalpatent/CN101136928B/en
Expired - Fee Relatedlegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

Translated fromChinese

本发明属于信息安全领域。本框架存在三个实体:访问请求者、访问控制器和策略管理器,策略管理器对访问请求者和访问控制器进行管理并实现它们之间的双向用户身份鉴别和平台完整性评估,访问请求者和访问控制器依据策略管理器的决策对本地端口进行控制;可信网络连接架构在终端接入网络之前对其平台状态进行度量。本发明利用基于可信第三方的安全协议来实现访问请求者和访问控制器的双向用户身份鉴别和双向平台完整性评估,确保了可信网络连接架构TNCA体系结构的安全性。策略管理器的引入,简化该架构的密钥管理,提高了该结构可扩展性,平台完整性评估具有更高安全性,实现了完整性集中校验,有较高普适性。

Figure 200710176091

The invention belongs to the field of information security. There are three entities in this framework: access requester, access controller and policy manager. The policy manager manages the access requester and access controller and implements two-way user identity authentication and platform integrity evaluation between them. Access request The operator and the access controller control the local port according to the decision of the policy manager; the trusted network connection architecture measures the platform status of the terminal before it accesses the network. The invention utilizes the security protocol based on the trusted third party to realize the two-way user identification and the two-way platform integrity evaluation of the access requester and the access controller, ensuring the security of the trusted network connection framework TNCA system structure. The introduction of the policy manager simplifies the key management of the architecture, improves the scalability of the architecture, provides higher security for platform integrity evaluation, realizes centralized integrity verification, and has high universality.

Figure 200710176091

Description

A kind of reliable network access framework
Technical field
The present invention relates to computer network framework, gateway, network service standard, computer program, relate in particular to a kind of reliable network access framework and nucleus equipment thereof, belong to information security field.
Background technology
Along with informationalized development gradually, computer network is deep day by day to the mankind's influence, and information security issue has become important social concern.One talks information security, people expect often be to resist the virus from the computer outside, hacker's attack and invasion and attack, and then expect antivirus software and " fire compartment wall ", but often ignore to come the attack of network internal.According to the statistics of world security circle, the attack that various computer networks suffer and to destroy 80% be to come from inside.At present, information security measure in the industry mainly is to plug up a leak, do high-wall, anti-outer attack etc. " old three samples ", but final result is hard to guard against.The main cause that produces this situation is that we do not go to control root---the terminal that produces unsafe problems, and always carries out shutoff in the periphery.Therefore, we should set about from the safety that improves use node self based on the pattern of " in anti-, inside and outside hold concurrently anti-", construct positive, comprehensive security protection system.
The authoritative institution of reliable computing technology is credible computation organization (Trusted ComputingGroup) in the world at present, this tissue is devoted to the formulation of trusted technology correlation technique standard always, face the diverse network attack at trusted terminal, TCG formulated based on the network of trusted technology connect standard (TrustedNetwork Connect, TNC).Credible calculating at first guarantees the credibility of all terminals, i.e. expecting of behavior set up believable network system by believable terminal, improves the controllability to network.
The main purpose of TNC framework is by providing a framework of being made up of the various protocols standard to realize the polynary network standard of a cover, and it provides following function:
Platform is differentiated: be used to verify network access request person's identity, and the integrality state of platform.
Terminal strategy mandate: for the state of terminal is set up a confidence levels, for example: confirm existence, state, the upgrade case of application program, the version of the rule base of upgrading anti-virus software and IDS, the Patch-level of terminal operating system and application program etc.Thereby thereby make terminal be given one can logging in network authorization policy obtain access to netwoks power under certain control of authority.
Access strategy: confirm terminal machine and its user's authority, and set up confidence levels in the past, the already present standard of balance, product and technology at its connection network.
Assess, isolate and remedy: confirm that the terminal function that does not meet credible policy requirement is isolated in outside the trustable network, if possible carry out the remedial measure that is fit to.
1, the basic framework of TNC and related entities
The basic framework of TNC mainly comprises three entities, three levels and several interface modules etc.This framework has increased two-layer on traditional network insertion level, but the integrity verification between implementation platform, thus satisfy credibility, integrality and fail safe.
2, three class primary entities:
Request visitor AR (the Access Requestor): function is for sending access request, and collecting platform integrality reliable information sends to PDP, connects thereby set up network.This entity comprises following assembly: network access request person (NAR) is responsible for sending access request, sets up network and connects.On an AR several different NAR can be arranged, the difference of setting up with network connects; TNC client (TNCC) is responsible for gathering the integrity measurement information from IMC, measures and report the integrity information of platform and IMC self simultaneously; Integrity measurement gatherer (IMC) is carried out the integrity properties of measuring AR.On an AR, a plurality of different IMC can be arranged.
Strategy execution person PEP (Policy Enforcement Point): this assembly control is to the visit of protected network.Whether PEP consulting PDP decides visit should be performed.
Strategic decision-making person PDP (Policy Decision Point): function for according to the recommendation of TNCS and local security policy to the judgement of making a strategic decision of the access request of AR, result of determination for allow/forbid/isolate.This entity comprises following three assemblies: access to netwoks mandate (NAA) determines whether the access request of an AR is allowed to.Whether NAA can seek advice from TNCS and decide the integrality state of AR consistent with the security strategy of NAA, thereby whether the access request of decision AR is allowed to; TNC server (TNCS) is responsible for the information flow between control IMV and the IMC, gathers the visit decision from IMV, and forms the visit decision of an overall situation, passes to NAA; Integrity measurement discriminator (IMV) is responsible for the integrity measurement value about AR that receives from IMC is differentiated, and is made the visit decision.
3, three basic layers:
Network access layer (Network Access Layer): this one deck is used to support traditional network interconnection technique, as 802.1X, and VPN, mechanism such as AAA Server.In this one deck the inside three entity: NAR, PEP and PDP are arranged.
Integrity assessment layer (Integrity Evaluation Layer): the integrality of being responsible for the entity of all request accesses network of assessment.There are two important interface: IF-IMC (IntegrityMeasurement Collector Interface) and IF-IMV (Integrity Measurement VerifierInterface) in this one deck and upper strata.Wherein, IF-IMV is that IMC is with the interface between the TNCC.The major function of this interface is to collect the integrity measurement value from IMC, and supports IMC with the information flow between the IMV; : IF-IMV is the interface between IMV and the TNCS.The major function of this interface is that the integrity measurement value that will obtain from IMC passes to IMV, supports IMC with the information flow between the IMV, and the visit decision that IMV made is passed to TNCS.
Integrity measurement layer (Integrity Measurement Layer): the assembly of collection and check request visitor's integrality relevant information.
4, other important interface module:
IF-TNCCS is the interface between TNCC and the TNCS.This interface definition an agreement, this agreement is transmitted following information: the information from IMC to IMV (as the integrity measurement value); Information from IMV to IMC (as requiring extra integrity measurement value); Session management information and some synchronizing informations.
IMC and IMV interface (IF-M): IF-M are the interfaces between IMC and the IMV.If some information relevant of the information spinner that on this interface, transmits with provider.
Network authorization host-host protocol (IF-T): IF-T is maintained in the message transmission between AR entity and the PDP entity.The assembly of safeguarding this interface in these two entities is NAR and NAA.
Policy enforcement point interface (IF-PEP): IF-PEP is the interface between PDP and the PEP.This interface is safeguarded the message transmission between PDP and the PEP.By it, PDP can indicate PEP that AR is carried out to a certain degree isolation, so that AR is repaired.After reparation is finished, can authorize the right of AR accesses network.
Summary of the invention
Purpose of the present invention is based on existing domestic and international trustable network interconnection technique research and analysis, the credible network connecting construction that has proposed to have independent intellectual property right.There are three entities in this credible network connecting construction: access requestor, access controller and policy manager, policy manager manages and realizes that to access requestor and access controller the two-way user identity between them differentiates and the platform integrity assessment, access requestor and access controller are controlled local port according to the decision-making of policy manager, thereby realize credible network connecting construction.
Credible network connecting construction was measured its platform status before accessing terminal to network, have only the security strategy of satisfying just to allow to be linked in the network, making directly access network of some computers that computer network is had a potential threat, is method a kind of active, that take precautions against in advance.Credible network connecting construction is an important component part of credible counting system structure, and purpose is that trust chain is extended to network from terminal, makes the trusted status of terminal expand to the interconnected systems of terminal.
The invention provides the nucleus equipment of trustable network connecting frame and realization trustable network, can not only control the trusted terminal access network, can also finish two-way user identity discriminating, the discriminating of two-way user platform identity and platform thermodynamic state verification to terminal, and can assess, isolate and repair terminal.Simultaneously, lay a good foundation for credible computing terminal, access control equipment, tactical management equipment, authenticating device, the Network Security Device of compatible different vendor.
1, basic framework
Credible network connecting construction is as shown in Figure 1:
Credible network connecting construction is described functional hierarchy, entity, assembly and interface.This framework is divided into three functional hierarchies: access to netwoks key-course, credible platform evaluation layer and integrity measurement layer; Have three entities: access requestor, access controller and policy manager; Each entity has comprised some functional units, is depositing a series of interfaces between the assembly.
2, entity
Credible network connecting construction has three entities:
Access requestor AR (Access Requestor): the entity that request connects.Its function is for sending access request, finishes with the user identity of access controller and differentiates, collects the integrity measurement value and sends to access controller, finish and access controller between the completeness of platform assessment, wait for that setting up network connects.This entity comprises following assembly: network access request person, trustable network connect client and integrality gatherer.
Access controller AC (Access Controller): function is the visit of control access requestor to network, receives the platform credible identification strategy and the assessment strategy of policy manager distribution; Receive the integrity measurement value of access requestor, collect the integrity measurement value of self, these integrity measurement values are sent to policy manager; Decision-making according to policy manager is carried out.This entity comprises following assembly: access to netwoks effector, trustable network Connection Service end and integrality gatherer.
Policy manager PM (Policy Manager): policy manager is responsible to define and distributing network access control policy and credible assessment strategy, assisting access requestor and access controller to carry out user identity differentiates, the validity of the AIK certificate of authentication-access requestor and access controller, the completeness of platform of verification access requestor and access controller, the Policy Result of the access to netwoks control of generation access requestor and access controller.This entity comprises following assembly: identification strategy server, assessment strategy server and completeness check person.
This framework is the logical architecture of credible network connecting construction, and entity or assembly can be a software, also can be an equipment, or even a cover system.A plurality of entities can be implemented on the different equipment with assembly, also can be implemented in as required on the equipment.
3, level
Credible network connecting construction is divided into three levels from bottom to up:
Access to netwoks key-course (Network Access Control Layer): realize the two-way user identity discriminating between network access request person and the access to netwoks effector.It is to utilize trusted third party's entity that network access request person and access to netwoks effector's user identity is differentiated, promptly the identification strategy server realizes, access requestor and access controller are reciprocity in discrimination process.Access requestor and access controller are controlled the port of self according to the user identity identification result of access to netwoks key-course and the access decision-making of credible platform evaluation layer, thereby realize mutual access control.
Credible platform evaluation layer (Trusted Platform Evaluation Layer): realize that trustable network connects the completeness of platform assessment between client and the trustable network Connection Service end.Trustable network connects the completeness of platform assessment of client and trustable network Connection Service end, utilizes trusted third party, and promptly the assessment strategy server realizes.The completeness of platform assessment comprises discriminating of platform identity and platform completeness check.In the credible platform evaluation process, the checking and the completeness of platform verification of the AIK certificate of access requestor and access controller are finished by policy manager.Policy manager makes a policy to the completeness of platform of access requestor and access controller, and the access to netwoks key-course is carried out according to this decision-making and connected control.
Integrity measurement layer (Integrity Measurement Layer): the completeness of platform of being responsible for collection and verification access requestor and access controller.The integrality gatherer of access requestor and access controller collects the integrity information of platform separately respectively, and the completeness check person of policy manager is responsible for the completeness of platform of verification access requestor and access controller.
4, functional unit
Credible network connecting construction comprises following functional unit:
Network access request person (Network Access Requestor, NAR): function is initiated access request for being responsible for to access controller, realizes the two-way user identity discriminating on the access to netwoks key-course of access requestor and access controller; Be responsible for protocol data to access controller or policy manager forwarding credible platform evaluation layer; According to the Policy Result of identification strategy server generation and the Policy Result of assessment strategy server generation, the port of self is controlled to realize the connection control to access controller.
The access to netwoks effector (Network Access Controller, NAC): function is differentiated for the two-way user identity of realizing access requestor and access controller; Be responsible for transmitting the protocol data of credible platform evaluation layer to network access request person and identification strategy server; According to the Policy Result of identification strategy server generation and the Policy Result of assessment strategy server generation, the port of self is controlled to realize the access control to access requestor.
(Authentication Policy Server, APS): function is for serving as trusted third party, and the two-way user identity of being responsible between realization access requestor and the access controller is differentiated for identification strategy server.
Trustable network connects client (TNC Client, TNCC): function is for asking and receive the integrality metric by the IF-IMC interface to upper strata integrality gatherer, realize the bi-directional platform integrity assessment of access requestor and access controller, the assessment result that generates according to the assessment strategy server generates the connection decision-making and sends to network access request person.
Trustable network Connection Service end (TNC Server, TNCS): function is for asking and receive the integrality metric by the IF-IMC interface to upper strata integrality gatherer, realize the bi-directional platform integrity assessment of access requestor and access controller, the assessment result that generates according to the assessment strategy server generates the access decision-making and sends to the access to netwoks effector.
(Evaluation Policy Server, EPS): function realizes the bi-directional platform integrity assessment of access requestor and access controller for serving as trusted third party to the assessment strategy server.The validity of the AIK certificate of assessment strategy server authentication-access requestor and access controller, send the platform integrity metric value of access requestor and access controller by the IF-IMV interface to upper strata completeness check person IMV, and receive the check results of the platform integrity metric value of the access requestor that returns by IMV and access controller.
Integrality gatherer (Integrity Measurement Collector, IMC): the integrity service of function for utilizing credible calculating platform to provide, the completeness of platform information of collecting access requestor and access controller.
(Integrity Measurement Verifier, IMV): function is for utilizing Integrity Management mechanism, the completeness of platform information of verification access requestor and access controller for the completeness check person.
5, interface
Credible network connecting construction has a plurality of interfaces.These interface definitions between the assembly relation and the agreement between the assembly and exchange messages.These interfaces are:
Trustable network coffret (Trusted Network Transport Interface, IF-TNT): the interface between network access request person and the access to netwoks effector, integrality have defined the information exchange between network access request person and the access to netwoks effector.
Identification strategy service interface (Authentication Policy Service Interface, IF-APS): the interface between access to netwoks effector and the identification strategy server has defined the information exchange between access to netwoks effector and the identification strategy server.
Trustable network connects client-trustable network Connection Service end interface (TNC Client-ServerInterface, IF-TNCCS): trustable network connects the interface between client and the trustable network Connection Service end, has defined the information exchange between trustable network connection client and the trustable network Connection Service end.
Assessment strategy service interface (Evaluation Policy Service Interface, IF-EPS): trustable network connects the interface between client trustable network Connection Service end and the assessment strategy server, has defined the information exchange between trustable network Connection Service end and the assessment strategy server.
The integrity measurement interface (Integrity Measurement Interface, IF-IM): the interface between integrality gatherer and the completeness check person, the interoperability agreement between the integrality gatherer of this each manufacturers produce of interface definition and the completeness check person.
Integrity measurement is collected interface (Integrity Measurement Collector Interface, IF-IMC): trustable network connects between client and the integrality gatherer and the protocol interface between trustable network Connection Service end and the integrality gatherer, this interface definition request and receiving platform integrity information.
Integrity measurement verification interface (Integrity Measurement Verifier Interface, IF-IMV): the protocol interface between assessment strategy server and the completeness check person, this interface definition send the agreement of completeness of platform information to the check results of integrality verifier and receiving platform integrity information.
Beneficial effect
The key management of this credible network connecting construction is simplified in the introducing of policy manager, has improved the extensibility of this architecture simultaneously.
Assessment strategy server's introducing in the policy manager, help the centralized management and the distribution of platform credible strategy, serve as trusted third party, make the completeness of platform assessment of credible platform evaluation layer have higher fail safe, realized the concentrated verification of completeness of platform simultaneously.
Description of drawings
Fig. 1 credible network connecting construction
The information flow chart of Fig. 2 credible network connecting construction
Numeral wherein is corresponding to the step of information flow
Embodiment
Information flow
The once complete information flow of credible network connecting construction as shown in Figure 2.
The information flow of credible network connecting construction is:
(1) network access request person initiates access request to the access to netwoks effector;
(2) after the access to netwoks effector receives network access request person's access request, realize that with network access request person and identification strategy server the two-way user identity of access requestor and access controller is differentiated.In the user identity discrimination process, policy manager serves as trusted third party, consults a master key between access requestor and the access controller.Access requestor and access controller utilize this master key to consult session key between them.Simultaneously, access requestor and access controller are controlled local port according to the result of two-way user identity discriminating;
(3) after user identity discriminating and the key agreement success, network access request person is mail to successful information trustable network respectively with the access to netwoks effector and is connected client and trustable network Connection Service end;
(4) after trustable network Connection Service end is received this successful information, the bi-directional platform integrity assessment of requestor and access controller conducts interviews---and the platform identity is differentiated and the platform completeness check, wherein the assessment strategy server is responsible for the AIK certificate of authentication-access requestor and access controller and the completeness of platform of verification access requestor and access controller, finally generates the completeness of platform assessment result of access requestor and access controller.In the completeness of platform evaluation process, integrality gatherer and completeness check person that trustable network connects client, trustable network Connection Service end and assessment strategy server needs and integrity measurement layer carry out information interaction;
(5) after the assessment of the completeness of platform of access requestor and access controller is finished, trustable network connects client and trustable network Connection Service end inserts decision-making accordingly according to the completeness of platform assessment result generation that the assessment strategy server generates, and sends to network access request person and access to netwoks effector respectively;
Network access request person and access to netwoks effector control local port according to the access decision-making (allowing/forbid/isolate) of receiving separately, thereby realization credible network connecting construction, be access controller according to of the visit of Decision Control access requestor to network, and access requestor judges whether to be connected to this network according to decision-making.
Access requestor
Hardware: have the complete host computer system of credible platform control module, comprise processor, memory, network adapter etc.
Software: operating system, platform credible service, network access request module, trustable network connect client, integrality collection module.
Access controller
Hardware: have the complete host computer system of credible platform control module, comprise processor, memory, network adapter etc.
Software: operating system, platform credible service, access to netwoks control module, trustable network Connection Service module, integrality collection module.
Policy manager
Hardware: have the complete host computer system of credible platform control module, comprise processor, memory, network adapter etc.
Software: operating system, platform credible service, identification strategy service module, assessment strategy service module, completeness check module.
This programme and TNC contrast
There is not policy manager among the TNC. This programme adds policy manager, in the set of strategies to trustable network Centralized Control is convenient in management; Concentrating of strategy and platform check avoided because controller is led by attack The terminal that causes is under attack; The key of credible network connecting construction has been simplified in the wherein introducing of diploma system Manage, improved simultaneously the extensibility of this architecture.
The assessment strategy server is conducive to centralized management and the distribution of platform credible strategy, serves as the credible the 3rd The side so that the assessment of the completeness of platform of credible platform evaluation layer has higher security, has realized simultaneously The concentrated verification of completeness of platform.

Claims (1)

1. a reliable network access framework is characterized in that, this framework is divided into three functional hierarchies: access to netwoks key-course, credible platform evaluation layer and integrity measurement layer; Have three entities: access requestor, access controller and policy manager;
Credible network connecting construction has three entities:
Access requestor: the entity that request connects; Its function is for sending access request, finishes with the two-way user identity of access controller and differentiates, collects the integrity measurement value and sends to access controller, finish and access controller between the completeness of platform assessment, wait for that setting up network connects; This entity comprises following assembly: network access request person, trustable network connect client and integrality gatherer;
Access controller: function is the visit of control access requestor to network, receives the platform credible identification strategy and the assessment strategy of policy manager distribution; Receive the integrity measurement value of access requestor, collect the integrity measurement value of self, these integrity measurement values are sent to policy manager; Decision-making according to policy manager is carried out; This entity comprises following assembly: access to netwoks effector, trustable network Connection Service end and integrality gatherer;
Policy manager: policy manager is responsible to define and distributing network access control policy and credible assessment strategy, assisting access requestor and access controller to carry out user identity differentiates, the validity of the proof identity key certificate of authentication-access requestor and access controller, the completeness of platform of verification access requestor and access controller, the Policy Result of the access to netwoks control of generation access requestor and access controller; This entity comprises following assembly: identification strategy server, assessment strategy server and completeness check person;
Credible network connecting construction is divided into three levels from bottom to up:
The access to netwoks key-course: access requestor, access controller and policy manager realize that two-way user identity discriminating exists, and access requestor and access controller are reciprocity in discrimination process; Access requestor and access controller are controlled the port of self according to the user identity identification result of access to netwoks key-course and the access decision-making of credible platform evaluation layer, thereby realize mutual access control;
The credible platform evaluation layer: trustable network connects the completeness of platform assessment of client and trustable network Connection Service end, utilizes trusted third party, and promptly the assessment strategy server realizes; The completeness of platform assessment comprises platform credential discriminating and platform completeness check; In the credible platform evaluation process, the checking and the completeness of platform verification of the proof identity key certificate of access requestor and access controller are finished by policy manager; Policy manager makes a policy to the completeness of platform of access requestor and access controller, and the access to netwoks key-course is carried out according to this decision-making and connected control;
Integrity measurement layer: the completeness of platform of being responsible for collection and verification access requestor and access controller; The integrality gatherer of access requestor and access controller collects the integrity information of platform separately respectively, and the completeness check person of policy manager is responsible for the completeness of platform of verification access requestor and access controller;
Credible network connecting construction comprises following functional unit:
Network access request person: function is initiated access request for being responsible for to access controller, differentiates with the two-way user identity that access to netwoks effector and identification strategy server are implemented on the access to netwoks key-course; Be responsible for data to access controller or policy manager forwarding credible platform evaluation layer; According to the Policy Result of identification strategy server generation and the Policy Result of assessment strategy server generation, the port of self is controlled to realize the connection control to access controller;
The access to netwoks effector: the two-way user identity of realizing access requestor and access controller with network access request person and identification strategy server is differentiated; Be responsible for transmitting the data of credible platform evaluation layer to network access request person and identification strategy server; According to the Policy Result of identification strategy server generation and the Policy Result of assessment strategy server generation, the port of self is controlled to realize the access control to access requestor;
Identification strategy server: function is for serving as trusted third party, and the two-way user identity of being responsible between realization access requestor and the access controller is differentiated;
Trustable network connects client: function is to collect interface to upper strata integrality gatherer request and reception integrality metric by integrity measurement, realize the bi-directional platform integrity assessment of access requestor and access controller, the assessment result that generates according to the assessment strategy server generates the connection decision-making and sends to network access request person;
Trustable network Connection Service end: function is to collect interface to upper strata integrality gatherer request and reception integrality metric by integrity measurement, realize the bi-directional platform integrity assessment of access requestor and access controller, the assessment result that generates according to the assessment strategy server generates the access decision-making and sends to the access to netwoks effector;
The assessment strategy server: function realizes the bi-directional platform integrity assessment of access requestor and access controller for serving as trusted third party; The validity of the proof identity key certificate of assessment strategy server authentication-access requestor and access controller, send the platform integrity metric value of access requestor and access controller by integrity measurement verification interface to upper strata completeness check person, and receive the check results of the platform integrity metric value of the access requestor that returns by the completeness check person and access controller;
Integrality gatherer: the integrity service of function for utilizing credible calculating platform to provide, the completeness of platform information of collecting access requestor and access controller;
The completeness check person: function is: utilize Integrity Management mechanism, the completeness of platform information of verification access requestor and access controller;
Credible network connecting construction has a plurality of interfaces, and these interfaces are:
The trustable network coffret: the interface between network access request person and the access to netwoks effector has defined the information exchange between network access request person and the access to netwoks effector;
The identification strategy service interface: the interface between access to netwoks effector and the identification strategy server has defined the information exchange between access to netwoks effector and the identification strategy server;
Trustable network connects client-trustable network Connection Service end interface: trustable network connects the interface between client and the trustable network Connection Service end, has defined the information exchange between trustable network connection client and the trustable network Connection Service end;
The assessment strategy service interface: trustable network connects the interface between client trustable network Connection Service end and the assessment strategy server, has defined the information exchange between trustable network Connection Service end and the assessment strategy server;
Integrity measurement interface: the interface between integrality gatherer and the completeness check person, the interoperability agreement between the integrality gatherer of this each manufacturers produce of interface definition and the completeness check person;
Integrity measurement is collected interface: trustable network connects between client and the integrality gatherer and the protocol interface between trustable network Connection Service end and the integrality gatherer, this interface definition request and receiving platform integrity information;
Integrity measurement verification interface: the interface between assessment strategy server and the completeness check person, this interface definition send the protocol information of completeness of platform information to integrality verifier and receiving platform integrity information check results.
CN2007101760914A2007-10-192007-10-19Reliable network access control systemExpired - Fee RelatedCN101136928B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN2007101760914ACN101136928B (en)2007-10-192007-10-19Reliable network access control system

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN2007101760914ACN101136928B (en)2007-10-192007-10-19Reliable network access control system

Publications (2)

Publication NumberPublication Date
CN101136928Atrue CN101136928A (en)2008-03-05
CN101136928B CN101136928B (en)2012-01-11

Family

ID=39160754

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN2007101760914AExpired - Fee RelatedCN101136928B (en)2007-10-192007-10-19Reliable network access control system

Country Status (1)

CountryLink
CN (1)CN101136928B (en)

Cited By (53)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2009015581A1 (en)*2007-08-012009-02-05China Iwncomm Co., Ltd.A method for trusted network connect based on tri-element peer authentication
WO2009015580A1 (en)*2007-08-012009-02-05China Iwncomm Co., Ltd.A trusted network connect method for enhancing security
WO2009018742A1 (en)*2007-08-032009-02-12China Iwncomm Co., Ltd.A trusted network connect system based on three-element peer authentication
WO2009065350A1 (en)*2007-11-162009-05-28China Iwncomm Co., Ltd.A trusted network acces control system based ternery equal identification
WO2010020188A1 (en)*2008-08-212010-02-25西安西电捷通无线网络通信有限公司Trusted network management method based on tcpa/tcg trusted network connection
WO2010040309A1 (en)*2008-10-102010-04-15华为技术有限公司Access method, network system and device
CN101286844B (en)*2008-05-292010-05-12西安西电捷通无线网络通信有限公司 A Two-way Authentication Method for Entities Supporting Fast Switching
WO2010051742A1 (en)*2008-11-042010-05-14西安西电捷通无线网络通信有限公司A method for authenticating a trusted platform based on the tri-element peer authentication (tepa)
WO2010083680A1 (en)*2009-01-212010-07-29华为技术有限公司Method for validating platform integrity, access device, network device and network system
WO2010118613A1 (en)*2009-04-162010-10-21西安西电捷通无线网络通信有限公司Implementation method for a tri-element peer authentication tursted network connection framework
JP2010536203A (en)*2007-08-082010-11-25西安西▲電▼捷通▲無▼▲綫▼▲網▼絡通信有限公司 Trusted network connect system with enhanced safety
WO2010142110A1 (en)*2009-06-082010-12-16西安西电捷通无线网络通信有限公司Platform authentication message management method suitable for tri-element peer authentication trusted network connect structure
WO2010142115A1 (en)*2009-06-082010-12-16西安西电捷通无线网络通信有限公司Access control method for tri-element peer authentication credible network connection structure
CN101951607A (en)*2010-10-142011-01-19中国电子科技集团公司第三十研究所Reliability-based wireless local area network trusted accessing method and system
WO2011022902A1 (en)*2009-08-252011-03-03西安西电捷通无线网络通信股份有限公司Method for implementing bidirectional platform authentication
CN101383823B (en)*2008-10-082011-03-23东南大学Network resource access control method in reliable access
CN101447992B (en)*2008-12-082011-04-06西安西电捷通无线网络通信股份有限公司Trusted network connection implementing method based on three-element peer-to-peer authentication
CN102035837A (en)*2010-12-072011-04-27中国科学院软件研究所Method and system for hierarchically connecting trusted networks
CN101247410B (en)*2008-03-282011-06-08上海中标软件有限公司Method for implementing reliable network system based on reliable computation
CN101277303B (en)*2008-05-162011-06-29东南大学 A control method for trusted and controllable network architecture
CN102215211A (en)*2010-04-022011-10-12中兴通讯股份有限公司Communication method, and security policy negotiation method and system for supporting trusted network connect
CN101488851B (en)*2009-02-252011-12-21中国人民解放军信息工程大学Method and apparatus for signing identity verification certificate in trusted computing
CN102355467A (en)*2011-10-182012-02-15国网电力科学研究院Power transmission and transformation equipment state monitoring system security protection method based on trust chain transmission
WO2012062136A1 (en)*2010-11-102012-05-18西安西电捷通无线网络通信股份有限公司Method and system for secure remote attestation in a trusted connection architecture
CN101540676B (en)*2009-04-282012-05-23西安西电捷通无线网络通信股份有限公司Platform identifying method suitable to identify credible network connecting construction in ternary equal way
WO2012083722A1 (en)*2010-12-202012-06-28西安西电捷通无线网络通信股份有限公司Method, client, and server for implementing platform authentication for trusted network connect architecture
CN103023911A (en)*2012-12-252013-04-03北京工业大学Authentication method for access of trusted network devices to trusted network
US8424060B2 (en)2007-11-162013-04-16China Iwncomm Co., Ltd.Trusted network access controlling method based on tri-element peer authentication
WO2013056674A1 (en)*2011-10-202013-04-25阿尔卡特朗讯公司Centralized security management method and system for third party application and corresponding communication system
CN103618613A (en)*2013-12-092014-03-05北京京航计算通讯研究所Network access control system
CN103780395A (en)*2014-01-242014-05-07广东电网公司电力科学研究院Method and system for proving bidirectional measurement through network access
US8756654B2 (en)2008-08-212014-06-17China Iwncomm Co., Ltd.Trusted network management method of trusted network connections based on tri-element peer authentication
US8789134B2 (en)2009-04-162014-07-22China Iwncomm Co., Ltd.Method for establishing trusted network connect framework of tri-element peer authentication
CN104079570A (en)*2014-06-272014-10-01东湖软件产业股份有限公司Trusted network connecting method based on IPsec
CN104462899A (en)*2014-11-292015-03-25中国航空工业集团公司第六三一研究所Trust access control method for comprehensive avionics system
CN104468606A (en)*2014-12-242015-03-25国家电网公司Trusted connecting system and method based on power generation control system
CN104618396A (en)*2015-03-042015-05-13浪潮集团有限公司Trusted network access and access control system and method
CN104811465A (en)*2014-01-272015-07-29电信科学技术研究院Decision method for access control and equipment
US9716707B2 (en)2012-03-122017-07-25China Iwncomm Co., Ltd.Mutual authentication with anonymity
CN109150866A (en)*2018-08-092019-01-04郑州云海信息技术有限公司A kind of policy distribution feedback and check system and method
CN109413107A (en)*2018-12-182019-03-01北京可信华泰信息技术有限公司A kind of credible platform connection method
CN109714185A (en)*2017-10-262019-05-03阿里巴巴集团控股有限公司Policy deployment method, apparatus, system and the computing system of trusted servers
US10291614B2 (en)2012-03-122019-05-14China Iwncomm Co., Ltd.Method, device, and system for identity authentication
CN109768967A (en)*2018-12-182019-05-17北京可信华泰信息技术有限公司A kind of credible platform connection system
CN109861970A (en)*2018-12-182019-06-07北京可信华泰信息技术有限公司A kind of system based on credible strategy
CN111654490A (en)*2020-05-282020-09-11全球能源互联网研究院有限公司 Power Security Trusted Monitoring System and Trusted Dynamic Association Perception Method
CN112966260A (en)*2021-03-032021-06-15北京中安星云软件技术有限公司Data security agent system and method based on domestic trusted computing platform
CN113726727A (en)*2021-05-302021-11-30国网河北省电力有限公司信息通信分公司Electric power Internet of things trusted connection method based on edge computing
CN113794685A (en)*2021-08-162021-12-14可信计算科技(无锡)有限公司Data transmission method and device based on credible evaluation
CN115001838A (en)*2022-06-202022-09-02上海电器科学研究所(集团)有限公司Plug-and-play credible access verification method for edge equipment of network collaborative manufacturing platform
CN115459940A (en)*2022-07-212022-12-09新华三信息安全技术有限公司 A verification method, device, electronic equipment and medium for a security policy
CN116015977A (en)*2023-01-282023-04-25武汉大学Network access control method and system for Internet of things equipment
CN119562258A (en)*2025-02-062025-03-04中国电力科学研究院有限公司 Power WLAN security reinforcement method, system and equipment based on trusted computing

Cited By (87)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JP2010534988A (en)*2007-08-012010-11-11西安西▲電▼捷通▲無▼▲綫▼▲網▼絡通信有限公司 Trusted network connect method with enhanced security
WO2009015580A1 (en)*2007-08-012009-02-05China Iwncomm Co., Ltd.A trusted network connect method for enhancing security
WO2009015581A1 (en)*2007-08-012009-02-05China Iwncomm Co., Ltd.A method for trusted network connect based on tri-element peer authentication
US8255977B2 (en)2007-08-012012-08-28China Iwncomm Co., Ltd.Trusted network connect method based on tri-element peer authentication
US8191113B2 (en)2007-08-032012-05-29China Iwncomm Co., Ltd.Trusted network connect system based on tri-element peer authentication
WO2009018742A1 (en)*2007-08-032009-02-12China Iwncomm Co., Ltd.A trusted network connect system based on three-element peer authentication
JP2010535440A (en)*2007-08-032010-11-18西安西▲電▼捷通▲無▼綫▲網▼絡通信有限公司 Trusted network connection system based on three-factor peer authentication
JP2010536203A (en)*2007-08-082010-11-25西安西▲電▼捷通▲無▼▲綫▼▲網▼絡通信有限公司 Trusted network connect system with enhanced safety
JP2011504026A (en)*2007-11-162011-01-27西安西▲電▼捷通▲無▼綫▲網▼絡通信股▲分▼有限公司 Trusted network access control system based on ternary equivalence identification
US8424060B2 (en)2007-11-162013-04-16China Iwncomm Co., Ltd.Trusted network access controlling method based on tri-element peer authentication
US8336083B2 (en)2007-11-162012-12-18China Iwncomm Co., Ltd.Trusted network access control system based ternary equal identification
WO2009065350A1 (en)*2007-11-162009-05-28China Iwncomm Co., Ltd.A trusted network acces control system based ternery equal identification
CN101247410B (en)*2008-03-282011-06-08上海中标软件有限公司Method for implementing reliable network system based on reliable computation
CN101277303B (en)*2008-05-162011-06-29东南大学 A control method for trusted and controllable network architecture
US8392710B2 (en)2008-05-292013-03-05China Iwncomm Co., Ltd.Entity bidirectional-identification method for supporting fast handoff
CN101286844B (en)*2008-05-292010-05-12西安西电捷通无线网络通信有限公司 A Two-way Authentication Method for Entities Supporting Fast Switching
US8756654B2 (en)2008-08-212014-06-17China Iwncomm Co., Ltd.Trusted network management method of trusted network connections based on tri-element peer authentication
WO2010020188A1 (en)*2008-08-212010-02-25西安西电捷通无线网络通信有限公司Trusted network management method based on tcpa/tcg trusted network connection
CN101383823B (en)*2008-10-082011-03-23东南大学Network resource access control method in reliable access
CN101582882B (en)*2008-10-102011-04-20华为技术有限公司Access method, network system and device
WO2010040309A1 (en)*2008-10-102010-04-15华为技术有限公司Access method, network system and device
US8533806B2 (en)2008-11-042013-09-10China Iwncomm Co., Ltd.Method for authenticating a trusted platform based on the tri-element peer authentication(TEPA)
WO2010051742A1 (en)*2008-11-042010-05-14西安西电捷通无线网络通信有限公司A method for authenticating a trusted platform based on the tri-element peer authentication (tepa)
EP2346207A4 (en)*2008-11-042013-04-24China Iwncomm Co LtdA method for authenticating a trusted platform based on the tri-element peer authentication (tepa)
KR101421329B1 (en)2008-11-042014-07-18차이나 아이더블유엔콤 씨오., 엘티디A method for authenticating a trusted platform based on the tri-element peer authentication(tepa)
CN101447992B (en)*2008-12-082011-04-06西安西电捷通无线网络通信股份有限公司Trusted network connection implementing method based on three-element peer-to-peer authentication
US8931049B2 (en)2008-12-082015-01-06China Iwncomm Co., Ltd.Trusted network connection implementing method based on tri-element peer authentication
WO2010083680A1 (en)*2009-01-212010-07-29华为技术有限公司Method for validating platform integrity, access device, network device and network system
CN101784051B (en)*2009-01-212012-11-21华为技术有限公司Method for verifying completeness of platform, network device and network system
CN101488851B (en)*2009-02-252011-12-21中国人民解放军信息工程大学Method and apparatus for signing identity verification certificate in trusted computing
WO2010118613A1 (en)*2009-04-162010-10-21西安西电捷通无线网络通信有限公司Implementation method for a tri-element peer authentication tursted network connection framework
US8789134B2 (en)2009-04-162014-07-22China Iwncomm Co., Ltd.Method for establishing trusted network connect framework of tri-element peer authentication
CN101540676B (en)*2009-04-282012-05-23西安西电捷通无线网络通信股份有限公司Platform identifying method suitable to identify credible network connecting construction in ternary equal way
US8826368B2 (en)2009-04-282014-09-02China Iwncomm Co., Ltd.Platform authentication method suitable for trusted network connect architecture based on tri-element peer authentication
CN101572704B (en)*2009-06-082012-05-23西安西电捷通无线网络通信股份有限公司Access control method suitable for tri-element peer authentication trusted network connect architecture
US8719897B2 (en)2009-06-082014-05-06China Iwncomm Co., Ltd.Access control method for tri-element peer authentication credible network connection structure
US20120079561A1 (en)*2009-06-082012-03-29China Iwncomm Co., Ltd.Access control method for tri-element peer authentication credible network connection structure
CN101572706B (en)*2009-06-082011-06-01西安西电捷通无线网络通信股份有限公司 A platform authentication message management method suitable for ternary peer-to-peer authentication trusted network connection architecture
WO2010142115A1 (en)*2009-06-082010-12-16西安西电捷通无线网络通信有限公司Access control method for tri-element peer authentication credible network connection structure
WO2010142110A1 (en)*2009-06-082010-12-16西安西电捷通无线网络通信有限公司Platform authentication message management method suitable for tri-element peer authentication trusted network connect structure
CN101635709B (en)*2009-08-252011-04-27西安西电捷通无线网络通信股份有限公司 A method that can realize two-way platform identification
WO2011022902A1 (en)*2009-08-252011-03-03西安西电捷通无线网络通信股份有限公司Method for implementing bidirectional platform authentication
CN102215211B (en)*2010-04-022016-01-20中兴通讯股份有限公司The security policy negotiation method and system of communication means, the access of support trustable network
CN102215211A (en)*2010-04-022011-10-12中兴通讯股份有限公司Communication method, and security policy negotiation method and system for supporting trusted network connect
CN101951607A (en)*2010-10-142011-01-19中国电子科技集团公司第三十研究所Reliability-based wireless local area network trusted accessing method and system
WO2012062136A1 (en)*2010-11-102012-05-18西安西电捷通无线网络通信股份有限公司Method and system for secure remote attestation in a trusted connection architecture
CN102035837B (en)*2010-12-072013-06-05广东金赋信息科技有限公司Method and system for hierarchically connecting trusted networks
CN102035837A (en)*2010-12-072011-04-27中国科学院软件研究所Method and system for hierarchically connecting trusted networks
WO2012083722A1 (en)*2010-12-202012-06-28西安西电捷通无线网络通信股份有限公司Method, client, and server for implementing platform authentication for trusted network connect architecture
CN102355467B (en)*2011-10-182015-07-08国网电力科学研究院Power transmission and transformation equipment state monitoring system security protection method based on trust chain transmission
CN102355467A (en)*2011-10-182012-02-15国网电力科学研究院Power transmission and transformation equipment state monitoring system security protection method based on trust chain transmission
WO2013056674A1 (en)*2011-10-202013-04-25阿尔卡特朗讯公司Centralized security management method and system for third party application and corresponding communication system
US9716707B2 (en)2012-03-122017-07-25China Iwncomm Co., Ltd.Mutual authentication with anonymity
US10291614B2 (en)2012-03-122019-05-14China Iwncomm Co., Ltd.Method, device, and system for identity authentication
CN103023911A (en)*2012-12-252013-04-03北京工业大学Authentication method for access of trusted network devices to trusted network
CN103023911B (en)*2012-12-252015-10-14北京工业大学Trustable network equipment access trustable network authentication method
CN103618613A (en)*2013-12-092014-03-05北京京航计算通讯研究所Network access control system
CN103780395B (en)*2014-01-242017-11-10广东电网公司电力科学研究院Network insertion proves the method and system of two-way measurement
CN103780395A (en)*2014-01-242014-05-07广东电网公司电力科学研究院Method and system for proving bidirectional measurement through network access
CN104811465B (en)*2014-01-272018-06-01电信科学技术研究院The decision-making technique and equipment of a kind of access control
CN104811465A (en)*2014-01-272015-07-29电信科学技术研究院Decision method for access control and equipment
CN104079570A (en)*2014-06-272014-10-01东湖软件产业股份有限公司Trusted network connecting method based on IPsec
CN104079570B (en)*2014-06-272017-09-22东湖软件产业股份有限公司A kind of trusted network connection method based on IPsec
CN104462899A (en)*2014-11-292015-03-25中国航空工业集团公司第六三一研究所Trust access control method for comprehensive avionics system
CN104468606A (en)*2014-12-242015-03-25国家电网公司Trusted connecting system and method based on power generation control system
CN104468606B (en)*2014-12-242018-10-09国家电网公司A kind of credible connection system and method controlling class system based on power generation
CN104618396A (en)*2015-03-042015-05-13浪潮集团有限公司Trusted network access and access control system and method
CN104618396B (en)*2015-03-042018-01-02浪潮集团有限公司A kind of trustable network access and access control method
CN109714185B (en)*2017-10-262022-03-04阿里巴巴集团控股有限公司Strategy deployment method, device and system of trusted server and computing system
CN109714185A (en)*2017-10-262019-05-03阿里巴巴集团控股有限公司Policy deployment method, apparatus, system and the computing system of trusted servers
CN109150866A (en)*2018-08-092019-01-04郑州云海信息技术有限公司A kind of policy distribution feedback and check system and method
CN109413107A (en)*2018-12-182019-03-01北京可信华泰信息技术有限公司A kind of credible platform connection method
CN109768967A (en)*2018-12-182019-05-17北京可信华泰信息技术有限公司A kind of credible platform connection system
CN109861970A (en)*2018-12-182019-06-07北京可信华泰信息技术有限公司A kind of system based on credible strategy
CN109861970B (en)*2018-12-182022-04-22北京可信华泰信息技术有限公司System based on credible strategy
CN111654490A (en)*2020-05-282020-09-11全球能源互联网研究院有限公司 Power Security Trusted Monitoring System and Trusted Dynamic Association Perception Method
CN111654490B (en)*2020-05-282022-08-30全球能源互联网研究院有限公司Power security credible monitoring system and credible dynamic association perception method
CN112966260A (en)*2021-03-032021-06-15北京中安星云软件技术有限公司Data security agent system and method based on domestic trusted computing platform
CN113726727A (en)*2021-05-302021-11-30国网河北省电力有限公司信息通信分公司Electric power Internet of things trusted connection method based on edge computing
CN113794685A (en)*2021-08-162021-12-14可信计算科技(无锡)有限公司Data transmission method and device based on credible evaluation
CN113794685B (en)*2021-08-162023-09-29德威可信(北京)科技有限公司Data transmission method and device based on credibility assessment
CN115001838A (en)*2022-06-202022-09-02上海电器科学研究所(集团)有限公司Plug-and-play credible access verification method for edge equipment of network collaborative manufacturing platform
CN115459940A (en)*2022-07-212022-12-09新华三信息安全技术有限公司 A verification method, device, electronic equipment and medium for a security policy
CN116015977A (en)*2023-01-282023-04-25武汉大学Network access control method and system for Internet of things equipment
CN116015977B (en)*2023-01-282024-06-18武汉大学Network access control method and system for Internet of things equipment
CN119562258A (en)*2025-02-062025-03-04中国电力科学研究院有限公司 Power WLAN security reinforcement method, system and equipment based on trusted computing
CN119562258B (en)*2025-02-062025-06-24中国电力科学研究院有限公司 Power WLAN security reinforcement method, system and equipment based on trusted computing

Also Published As

Publication numberPublication date
CN101136928B (en)2012-01-11

Similar Documents

PublicationPublication DateTitle
CN101136928A (en) A Trusted Network Access Framework
CN100566252C (en)A kind of trusted network connection system of differentiating based on the ternary equity
CN100553212C (en) A trusted network access control system based on ternary peer-to-peer authentication
CN114465807B (en) A method and system for dynamic trust evaluation and access control of zero trust API gateway based on machine learning
RU2437228C2 (en)System of trustworthy network connection for safety improvement
CN100581116C (en) A Method for Realizing Trusted Network Management
WO2009015580A1 (en)A trusted network connect method for enhancing security
WO2009015581A1 (en)A method for trusted network connect based on tri-element peer authentication
CN113676447A (en)Block chain-based scientific and technological service platform cross-domain identity authentication scheme
CN104580061B (en)The polymerization and system of fault-tolerant and resisting differential attack are supported in a kind of intelligent grid
CN102035837A (en)Method and system for hierarchically connecting trusted networks
CN107920089A (en)A kind of intelligent network lotus interactive terminal protecting information safety authentication encryption method
CN117749533A (en) A zero-trust forestry Internet of Things management platform system and security protection method
CN114900294A (en)Credibility measurement and remote certification method and system for sensing layer of Internet of things
CN103780395B (en)Network insertion proves the method and system of two-way measurement
Portal et al.An edge decentralized security architecture for industrial iot applications
CN204697072U (en)A kind of secure accessing managing and control system of network end nodes
KR20250120823A (en)IoT terminal security system and IoT terminal security method using it
CN116055220B (en) A method and system for security protection management and control of an Internet of Things terminal
CN105790935A (en)Independent-software-and-hardware-technology-based trusted authentication server
CN102215211B (en)The security policy negotiation method and system of communication means, the access of support trustable network
CN201557132U (en) Cross-domain management device based on PKI/PMI technology
Wang et al.Design of terminal security access scheme based on trusted computing in ubiquitous electric internet of things
CN112749375A (en)User identity authentication system based on TMIS system
CN114915482B (en)Working method of safe power resource access system for distribution network interoperation protocol

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
C14Grant of patent or utility model
GR01Patent grant
CF01Termination of patent right due to non-payment of annual fee

Granted publication date:20120111

Termination date:20211019

CF01Termination of patent right due to non-payment of annual fee

[8]ページ先頭

©2009-2025 Movatter.jp