Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure access method, system and client

A secure access and client technology, applied in the field of network security, can solve problems such as the inability to guarantee the legitimacy of the hardware KEY, and achieve the effect of improving security

Inactive Publication Date: 2010-09-22
CHINA UNITED NETWORK COMM GRP CO LTD +1
View PDF3 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The example of the present invention provides a secure access method, system and client to solve the defect that the validity of the hardware KEY cannot be guaranteed when implementing network access in the prior art, and improve the security of network access

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure access method, system and client
  • Secure access method, system and client
  • Secure access method, system and client

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the purpose, technical solutions and advantages of the examples of the present invention clearer, the technical solutions in the examples of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the examples of the present invention. Obviously, the described examples are part of the present invention instance, but not all instances. Based on the examples in the present invention, all other examples obtained by persons of ordinary skill in the art without creative efforts belong to the protection scope of the present invention.

[0022] Secure Subscriber Identity Module (referred to as: SIM) card is a small hardware device with 7816 interface, compatible with standard SIM card, has telecommunication functions, and can be adapted to different terminal devices, such as mobile phones, wireless netbooks, etc. . The security SIM card has a built-in smart card chip (such as a central processing u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides secure access method, system and client. The secure access method comprises the following steps of: signing and encrypting information inside a secure smart card by using a built-in digital certificate of the secure smart card; sending the information of the signed and encrypted secure smart card to a platform so that the platform can verify the legality of the information of the validity of the digital certificate; after verifying the legality of the information of the validity of the digital certificate, signing and encrypting an access request by using the digital certificate, and sending the signed and encrypted access request to a network-side device to realize secure access. The secure access method, system and client provided by the embodiment of the invention overcome the defect that the legality of hardware KEY can not be guaranteed when network access is realized in the prior art and increase the security of network access.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of network security, and in particular to a secure access method, system and client. Background technique [0002] With the continuous advancement of enterprise informatization, more and more enterprises use the Internet (Internet) to satisfy employees, customers and partners to remotely access enterprise internal network resources, which will inevitably bring certain security threats to the enterprise internal network. , so a secure access mechanism is needed to ensure the security of communications and sensitive information. At present, the main ways for enterprises to achieve secure access through the Internet are Internet Security Virtual Private Network (IP Security Virtual Private Network; IPSec VPN for short) and Security Socket Layer Virtual Private Network (Security SocketLayer Virtual Private Network; SSL VPN for short). ) two kinds. Among them, because the SSLVPN method...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04W12/04H04W12/06
Inventor 王炳辉杨阳
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products