Access control method and safety proxy server

A proxy server, access control technology, used in digital transmission systems, data exchange networks, electrical components, etc.

Active Publication Date: 2008-01-09
MAIPU COMM TECH CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, this mechanism is only for a certain application system, and cannot provide unified access control for all services provided in the network.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and safety proxy server
  • Access control method and safety proxy server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Referring to Fig. 1 and Fig. 2, the present invention relates to a proxy server and a proxy client based on the SSL protocol. In the SSL protocol, both server-side and client-side certificate verification are used, that is, the SSL server certificate is used on the SSL proxy server side, and the SSL client certificate is used on the SSL proxy client side. When users use it, they need to use the SSL client certificate to log in. In order to connect with the SSL proxy server. Since the subject DN is used in the digital certificate to identify the user's name, the access control based on the digital certificate is to control the access to the user specified in the subject DN. Implement an access control list based on the subject DN element in the digital certificate on the SSL proxy server side. Each control list can contain several entries, and each entry is composed of a DN template that needs to be matched and a processing action, that is, the subject DN can be specifie...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed a visit-control method relates to the computer communication technique, especially the safety visit-control technique based on SSL protocol. The invention operates the visit-control on the visit of proxy client end according to the visit-control list which has a user identification mold to one-to-one process the motion mapping relation, The advantages of invention comprise: the visit-control function is provided on the base of using SSL protocol to protect; a uniform visit-control design can be provided to all application system in the proxy range; different main body DN which applies certificate can be controlled flexibly.

Description

technical field [0001] The invention relates to computer communication technology, in particular to security access control technology based on SSL protocol. Background technique [0002] Secure Sockets Layer (SSL, Secure Sockets Layer) is a security protocol developed by Netscape. When the SSL session starts, the web server will send the public key to the browser, and negotiate between the server and the browser to generate an encrypted environment for secure transmission. During the session, the browser and the server use this secure environment for data exchange, thereby realizing the confidentiality and integrity of data transmission. [0003] In the application proxy based on the SSL protocol, the SSL / TLS protocol is used between the application proxy server and the application proxy client to realize the protection of confidentiality and integrity. When the application proxies the client to access, the confidentiality and integrity of the proxied service can be guara...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L9/32H04L29/06
Inventor 杜勇孟春雷
Owner MAIPU COMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products