Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Proxy access method and device, proxy gateway and readable storage medium

An access method and proxy gateway technology, applied in the VPN field, can solve the problems of high development difficulty and post-operation and maintenance cost of WEBVPN equipment, increased product cost, and lack of flexibility in certification, so as to improve product competitiveness and customer experience, and reduce development difficulty. , reduce the effect of the finished product

Active Publication Date: 2020-06-30
SANGFOR TECH INC
View PDF8 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This method of proxy brings certain convenience, but also makes the authentication of WEBVPN inflexible due to the strong coupling of identity authentication business and proxy business. To achieve personalized authentication, customers must customize the authentication module of WEBVPN. Affected by various factors, the differences in authentication methods between customers are often certain, that is to say, customization is often necessary, which brings higher development difficulty and later operation and maintenance costs to manufacturers of WEBVPN equipment, resulting in increase product cost
More importantly, customers often set up their own authentication mechanism in order to satisfy their own other business. The existing WEBVPN-based implementation method is equivalent to adding a set of identity authentication mechanism for proxy business, and the existing identity authentication mechanism cannot be effectively used.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proxy access method and device, proxy gateway and readable storage medium
  • Proxy access method and device, proxy gateway and readable storage medium
  • Proxy access method and device, proxy gateway and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The purpose of this application is to provide a proxy access method and device applied to a proxy gateway, as well as a proxy gateway and a readable storage medium, aiming to eliminate the traditional WEBVPN implementation mechanism caused by the strong coupling of identity authentication business and proxy business A series of problems, make full use of the identity authentication mechanism of the customer itself, reduce the cost of the agency gateway, improve product competitiveness and customer experience.

[0059] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this ap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a proxy access method. The proxy gateway provided by the invention only has the proxy service; the identity authentication service is returned to an authentication server of the client; after judging that the access request does not contain the authentication information issued by the authentication server after passing the authentication, the access request is sent to theauthentication server; and the proxy gateway redirects the browser to the authentication server so as to complete identity authentication between the user and the authentication server, and finally judges that the access request meets the requirement of executing the proxy access operation through gradual validity verification. According to the method, decoupling of the proxy service and the identity authentication service is realized, an existing identity authentication mechanism of a client is fully utilized, the development difficulty and the later operation and maintenance cost of the proxy gateway are reduced, the finished product of the proxy gateway is reduced, and the product competitiveness and the client experience are improved. The invention also discloses a proxy access deviceapplied to the proxy gateway, the proxy gateway and a readable storage medium, which have the above beneficial effects.

Description

technical field [0001] The present application relates to the technical field of VPN, in particular to a proxy access method and device applied to a proxy gateway, a proxy gateway and a readable storage medium. Background technique [0002] VPN, Virtual Private Network, the function of a virtual private network is to establish a private network on a public network for encrypted communication, and it is widely used in enterprise networks. WEBVPN (WEB Virtual Private Network, WEB-based virtual private network) can provide web-based intranet application access control, allowing authorized users to access web applications that are only open to the intranet, and is currently widely used as an external proxy for intranet applications control. [0003] The implementation process of WEBVPN to enable external users to access and control intranet applications can be found in the following figure 1 As shown in the sequence diagram, it should be understood that the reason why WEBVPN c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0272H04L63/0807H04L63/0281
Inventor 刘洋
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products