VPN secure access method and system thereof

A technology of safe access and safe channel, which is applied in the field of VPN network safe access method and system, can solve the problems that the automatic identification of IE browser cannot be realized, and achieve the effect of low maintenance cost

Inactive Publication Date: 2009-06-03
北京东方中讯联合认证技术有限公司
View PDF0 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] Users must manually perform VPN dial-up before they can access the business system protected by VPN, and the automatic identification of IE browser cannot be realized

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • VPN secure access method and system thereof
  • VPN secure access method and system thereof
  • VPN secure access method and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0042] An implementation of the present invention is based on serving the key e-government business system of a certain national ministry. This business system is a system with a large number of users and is distributed all over the country. There are B / S type systems and C / S systems, so it is necessary to improve the security of the system as much as possible. At present, there are mainly two ways for enterprises to realize secure access through the Internet: IPSec VPN and SSL VPN. In the following embodiments, IPSec VPN is taken as an example to illustrate the VPN secure access solution of the present invention.

[0043]The "VPN security access scheme" provided by the present invention is a complete set of security access soluti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of network security and provides a VPN secure access method, a system and a VPN client thereof; wherein, the VPN secure access method comprises the steps as follows: the VPN client, which employs a hardware Key, sends an access request to the network; the access request is signed and encrypted by the hardware Key; the network carries out identity authentication on the VPN client after receiving the access request and establishes a safe passage with the VPN client after the identity authentication is passed; and the VPN client carries out safety service interaction with the network by the hardware Key and the safe passage. The invention integrates secure access, identity authentication for clients with high intensity and a timing and charging module seamlessly, and provides a whole secure access proposal, thus reducing the difficulty of system distribution and operation maintenance while guaranteeing the network safety, and facilitating the use for clients.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a VPN (Virtual Private Network) network security access method and system. Background technique [0002] For many large-scale distributed systems, such as the key e-government business system of a certain national ministry, it must be oriented to many different needs and users of different scales, with a large number of application systems and a variety of different technical architectures. There are both B / S-based business systems and C / S-based business systems. Due to the particularity of business processing and the wide range of users, this type of system has high security requirements. [0003] At present, there are mainly two ways for enterprises to realize secure access through the Internet: IPSec (IPSecurity) VPN and SSL (Security Socket Layer) VPN. Both technologies have their own advantages in different fields. It is more appropriate to use IPSec VPN technolog...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/46H04L9/32H04L29/06
Inventor 曾燕珲戚天龙余耀辉尹志兵姜峰
Owner 北京东方中讯联合认证技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products