A VPN connection separation method based on operating system desktop
A separation method and operating system technology, which is applied in the field of VPN connection separation based on the operating system desktop, can solve problems such as security loopholes, and achieve the effect of protecting sensitive data of enterprises
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0009] The present invention will be described in detail below in conjunction with the accompanying drawings and examples.
[0010] like figure 1 Shown, the inventive method comprises the following steps:
[0011] 1. Set up a security proxy device at the front end of the enterprise intranet, which is a VPN access gateway device. The client computer first connects to the security proxy device through the Internet, and then the security proxy device connects to the corporate intranet.
[0012] 2. When an application program on the client computer wants to access the VPN connection, the client computer first downloads the VPN proxy program from the security proxy device, and then establishes a VPN connection with the security proxy device through the VPN proxy program.
[0013] 3. After receiving the access request, the VPN proxy program will trace back the application program that initiated the access terminal, then enumerate the running windows of the application program, and ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com