Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Web service mapping method and system of security agent in virtual private network (VPN)

A technology of security proxy and mapping method, applied in the field of communication, can solve the problems of difficult Web response parsing and complex code, and achieve the effect of improving the speed and efficiency of request and response, simple implementation, high stability and high efficiency

Active Publication Date: 2013-04-24
ARRAY NETWORKS BEIJING
View PDF5 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The inventors of the present invention have found that the traditional application layer VPN needs to analyze and understand the content of the Web application, and by rewriting the content, the request sent by the user's browser will pass through the VPN, so as to realize the SSL security proxy. This method will have the following problems , as the code written in Javascirpt becomes more and more complex, it becomes more and more difficult to parse the web response. At the same time, the web technology is constantly updated, such as RSS, etc., and the support for these new technologies must be continuously increased. Therefore, it is necessary to develop a A technique to simplify the process of parsing and rewriting web responses to solve the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web service mapping method and system of security agent in virtual private network (VPN)
  • Web service mapping method and system of security agent in virtual private network (VPN)
  • Web service mapping method and system of security agent in virtual private network (VPN)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In the following description, numerous technical details are set forth in order to provide the reader with a better understanding of the present application. However, those of ordinary skill in the art can understand that even without these technical details and various changes and modifications based on the following embodiments, the technical solutions claimed in the claims of the present application can be realized.

[0034]In order to make the objectives, technical solutions and advantages of the present invention clearer, the embodiments of the present invention will be further described in detail below with reference to the accompanying drawings.

[0035] The first embodiment of the present invention relates to a Web service mapping method for a security proxy in a VPN. figure 1 It is a schematic flowchart of the Web service mapping method of the security proxy in the VPN. In the web service mapping method of the security proxy in the VPN, the security proxy in t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of communications, and discloses a web service mapping method and a system of a security agent in a virtual private network (VPN). Web response analysis and rewriting processes are simplified, achieving is easy, and stability and efficiency are high. In the web service mapping method and the system of the security agent in the VPN, the mapping relation of a domain name or a port which supplies web services and security agents is preset by the security agent in the VPN, wherein different web services correspond to different domain names or different ports. When the security agent receives a web service request from a client terminal, a corresponding web service is found from the mapping relation according to the domain name in the request or the port which receives the request, and the request is forwarded to a web server which supplies the web service. When the security agent receives a web response from the web server, according to the mapping relation, chaining which points to the web service in the web response is replaced by chaining which points to a corresponding domain name or a corresponding port of the security agent, and then the replaced web response is forwarded to the client terminal.

Description

technical field [0001] The invention relates to the field of communication, in particular to a Web service mapping technology of a security proxy in a VPN. Background technique [0002] Virtual Private Network (Virtual Private Networking, referred to as "VPN") mainly adopts the protocols of Internet Protocol Security (Internet Protocol Security, referred to as "IPSec"), Point to Point Tunneling Protocol (Point to Point Tunneling Protocol, referred to as "PPTP"), Layer 2 Forwarding (Protocol) (Layer 2Forwarding, referred to as "L2F") and Layer 2 Tunnel Protocol (Layer 2Tunnel Protocol, referred to as "L2TP"), etc.; SSL VPN refers to the use of Secure Socket Layer (Secure Socket Layer, referred to as "SSL" for short) ) protocol to achieve a VPN technology for remote access. The SSL protocol is a security protocol proposed by Netscape, which includes: server authentication, client authentication (optional), data integrity and data confidentiality authentication on the SSL link...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/12H04L12/46
Inventor 段木全刘升郑凤顺胡延锐
Owner ARRAY NETWORKS BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products