VPN authentication method

An authentication method and legal technology, applied in the field of computer networks, can solve the problem of insufficient authentication strength, and achieve the effect of reducing the probability of user account theft and improving security.

Inactive Publication Date: 2009-12-23
SANGFOR TECH INC
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to some historical problems in some large-scale enterprises, many VPN application systems only use user names and passwords to ensure the security of the system, so the authentication strength is not strong enough, and there are access security holes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • VPN authentication method
  • VPN authentication method
  • VPN authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] At first, illustrate the inventive method:

[0028] like figure 1 As shown, in the VPN authentication method of the present invention, on the mobile terminal user side, before the user logs in to the VPN, it is necessary to obtain the area information of the user through the mobile terminal, and the mobile terminal checks whether the current area information of the user is legal, thereby judging whether to allow The user logs in and uses the VPN.

[0029] like figure 2 As shown, in the VPN authentication method of the present invention, on the network side, after the VPN is started, the user login message is monitored. After the user logs in, the area information reported by the user is obtained, and the information is verified to determine whether the area information of the user is illegal. , if it is an illegal area, deny the user access to the VPN, otherwise allow the user access for further authentication.

[0030] Further, the method of the present invention i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a VPN authentication method which comprises the following steps: acquiring area information reported by a mobile terminal user; rejecting the mobile terminal user in an illegal area to access a VPN; and allowing the mobile terminal user passing authentication in a legal area to access the VPN. The VPN authentication method helps improve safety of authentication by limiting areas, can limit a movement range of the user for reasons of service and the like, and can further reduce probability of misappropriation of a user account (an appropriator must be in the same area as the user).

Description

technical field [0001] The invention relates to a computer network, in particular to a security-enhanced virtual private network (VPN) authentication method. Background technique [0002] With the popularization of the Internet and the vigorous development of e-commerce, more and more enterprises are gradually relying on computer networks and application systems to conduct business, and at the same time use the Internet to carry out more business activities. Due to some historical problems in some large-scale enterprises, many VPN application systems only use user names and passwords to ensure the security of the system, so the authentication strength is not strong enough, and there are access security loopholes. If it is restricted by the IP address of the Internet protocol, the dynamic IP address can bypass this restriction, and mobile terminal users generally have a dynamic IP address. [0003] On the other hand, location-based wireless services are undoubtedly one of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04L9/32
Inventor 徐清木
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products