Method for implementing distributed security policy, client terminal and communication system thereof
A technology for security policies and implementation methods, applied in transmission systems, network connections, electrical components, etc., can solve the problems of access control failure and easy tampering by others, and achieve the effect of reducing burden, flexible access control, and ensuring security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0040] This embodiment describes a method for implementing a distributed security policy, by which method the integrity, confidentiality, and security of the client-side access control list can be ensured when access control is processed in a distributed manner. Detailed description will be given below in conjunction with the drawings.
[0041] See figure 1 , The method of this embodiment may include the following steps:
[0042] Step 101: After passing the authentication, obtain an access control list corresponding to the user;
[0043] It can also include before step 101:
[0044] Initiate a secure socket layer connection request to the gateway;
[0045] After establishing the secure socket layer request, send an authentication request to the gateway;
[0046] If the gateway is authenticated, step 101 is executed.
[0047] Step 102: Calculate the access control list through a hash algorithm with keys (HMAC), and store the calculated value obtained by the calculation;
[0048] The HMAC c...
Embodiment 2
[0070] This embodiment describes a method for implementing a distributed security policy, by which method the integrity, confidentiality, and security of the client-side access control list can be ensured when access control is processed in a distributed manner. Detailed description will be given below in conjunction with the drawings.
[0071] See figure 2 , The method of this embodiment may include the following steps:
[0072] Step 201: The client establishes an SSL connection with the gateway;
[0073] The client may establish an SSL connection with the gateway by sending an SSL connection establishment request message to the gateway.
[0074] Step 202: The client initiates a user authentication request to the gateway;
[0075] If the client wants to access the security gateway, it first needs to perform user authentication. The client may send a user authentication request message to the gateway, so that the gateway can authenticate the user according to the user authentication r...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 