Unlock instant, AI-driven research and patent intelligence for your innovation.

User non-inductive VPN access method based on container technology

A container technology and access method technology, which is applied in the field of user non-sensing VPN access based on container technology, can solve the problems of reduced work efficiency, failure to succeed, and complicated connection process, so as to improve work efficiency, simplify the connection process, strengthen the safety effect

Inactive Publication Date: 2019-08-09
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If some unexpected conditions occur during the configuration process, the connection process will be artificially complicated, reducing work efficiency or even failing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User non-inductive VPN access method based on container technology
  • User non-inductive VPN access method based on container technology
  • User non-inductive VPN access method based on container technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0047] In this solution, the key problem to be solved is: when users are in the public network, they can access the internal network of the enterprise in a non-conscious and safe manner. To achieve this goal, no additional networking operations are required on mobile terminals such as notebooks and mobile phones, and all VPN-related software deployment and parameter configuration are automatically completed on the network access device at the user end.

[0048] In this example, if figure 1 As shown, the complete user-insensitive VPN access system consists of three parts, which are: user equipment software and hardware feature extraction subsystem, cloud VPN management subsystem, and containerized public network access equipment.

[0049] Among them, the user equipment software and hardware feature extraction subsystem is composed of an enterprise network administrator terminal and a mobile user terminal. The enterprise network administrator is responsible for collecting the s...

example

[0078] Enterprise B registers enterprise information with the service provider, applies for this service, and provides information to the management platform as B-1.1.110.1 / 16. And register the type of VPN used by the enterprise as SSL VPN, and the SSL VPN address as https: / / gateway.b.com .

[0079] User A holds a XIAOMI 5S mobile phone, the system MIUI 10.1.1.0stable, baseband version TH20c1.9-0926_1622_3a7bd2d, kernel version 3.18.31-perf-g0bf156d-01143-g2d4873d, WLAN MAC address 34:80:b3:f8:65: a0. The device is newly purchased and has not been connected to the work unit network, so the employee identity authentication is performed through the client software, and after passing, the above information is sent to the enterprise network administrator.

[0080] After the network administrator receives the above information, the administrator software calculates the fingerprint of the user device: 966634ebf2fc135707d6753692bf4b1e. Then, the administrator assigns a certific...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user non-inductive VPN access method based on a container technology. Enterprise VPN network information registration and terminal user equipment information registration arecarried out firstly, then deployment of terminal access equipment based on the container technology is started, and after deployment is completed, VPN communication between the terminal user equipment and an enterprise network is achieved in combination with registration signals. Therefore, the whole access process does not depend on the use environment of a user, the connection process is simple, manual configuration is not needed, and the working efficiency is improved.

Description

technical field [0001] The invention belongs to the technical field of network communication, and more specifically relates to a method for user-insensitive VPN access based on container technology. Background technique [0002] A virtual private network (Virtual Private Network, VPN) is a communication method commonly used to connect private networks between medium and large enterprises or between groups. The information of the virtual private network transmits the network information of the intranet through the public network framework (such as: the Internet). It uses encrypted tunneling protocols to achieve private message security effects such as confidentiality, sender authentication, and message accuracy. This technology can use unsafe networks (such as the Internet) to send reliable and secure messages. The emergence of this technology meets the needs of enterprise mobile office workers, enabling them to use authentication information to access and manage the resourc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/46H04L29/06H04L29/08
CPCH04L12/4641H04L63/08H04L67/10
Inventor 郭秉楠刘坚许都
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA