Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for realizing network access authentication, transmission encryption and UTM

A technology of network access and network transmission, which is applied in the field of network access authentication, transmission encryption, and UTM systems. It can solve the problems of poor overall network performance, poor compatibility, and seamless integration, so as to reduce networking costs and improve Overall network performance, enhanced linkage effects

Inactive Publication Date: 2010-07-21
SHENZHEN VINCIN UNITED TECH
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, most security switches on the market only have the functions of authentication and VLAN division; although there are also a few switches that realize the combination of anti-virus, linkage with IDS, and IDP, but these products are only in the stacking of products stage, and the seamless integration of the above functions cannot be realized
[0003] Therefore, the above deployment method will inevitably have the following disadvantages: poor linkage and compatibility between different products; poor overall network performance; high deployment cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for realizing network access authentication, transmission encryption and UTM
  • System and method for realizing network access authentication, transmission encryption and UTM
  • System and method for realizing network access authentication, transmission encryption and UTM

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Refer below figure 1 Describe in detail an embodiment of a system for realizing network access authentication, transmission encryption, and UTM provided by the present invention; as shown in the figure, this embodiment mainly includes:

[0022] The network access authentication subsystem 1 is configured to perform access authentication on users accessing the network according to a preset authentication method;

[0023] The network transmission encryption subsystem 2 is used to encrypt / decrypt the network data packets that need to be encrypted / decrypted in the network transmission link according to the preset key;

[0024] The unified threat management subsystem 3 is used to perform unified threat management on network data packets according to preset management strategies;

[0025] The network flow control subsystem 4 is connected with the above-mentioned subsystems, and is used to intercept network data packets at the bottom layer of the network driver of the controll...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system for realizing network access authentication, transmission encryption and UTM, which comprises a network access authentication subsystem for performing access authentication on a user accessing a network, a network transmission encryption and decryption subsystem for encrypting / decrypting a network data packet needing encrypting / decrypting in a network transmission link, a unified threat management subsystem for performing the unified threat management on the network data packet and a network transfer control subsystem, wherein the subsystems are connected to judge the type and validity of the network data packet and transfer the network data packet to the network access authentication subsystem, or the network transmission encryption subsystem and the unified threat management subsystem to execute the corresponding access authentication, or encryption / decryption and the unified threat management. The invention also discloses a corresponding method for realizing the network access authentication, the transmission encryption and the UTM. Through the system and the method, the seamless integration of the network access authentication, the transmission encryption and the UTM is realized and simultaneously different combinations among the network access authentication, the transmission encryption and the UTM functions can be configured and selected according to needs.

Description

technical field [0001] The invention relates to the field of network communication security, in particular to a system and method for realizing network access authentication, transmission encryption and UTM. Background technique [0002] At present, the network access authentication system and equipment, network transmission encryption system and equipment, and UTM system and equipment are basically deployed in the form of a single product application and superimposed deployment. At present, most security switches on the market only have the functions of authentication and VLAN division; although there are also a few switches that realize the combination of anti-virus, linkage with IDS, and IDP, but these products are only in the stacking of products stage, the seamless integration of the above functions cannot be realized. [0003] Therefore, the above-mentioned deployment method will inevitably have the following disadvantages: poor linkage and compatibility between diffe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/08H04L12/56
Inventor 蓝晓敏
Owner SHENZHEN VINCIN UNITED TECH