Unlock instant, AI-driven research and patent intelligence for your innovation.

A Trusted Access Authentication System Based on Virtualized Network

A virtualized network and access authentication technology, which is applied in the field of trusted access authentication system based on virtualized network, can solve problems such as difficult management of virtualized resources, difficult protection of network security equipment, user data security threats, etc., to achieve Realize the effect of security control

Active Publication Date: 2022-08-02
SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

From a technical point of view, cloud computing realizes the pooling of computing resources, storage resources and network resources in the data center through virtualization technology, which can be allocated and used by cloud center users uniformly, which brings a lot of convenience to users. However, virtualization technology The introduction of virtualization also brings new risks such as difficult management of virtualized resources and difficult definition of virtualized network boundaries. Malicious attackers invade virtualized networks by attacking virtual machines, spread viruses or steal information and data in virtualized networks, causing The business applications and user data running on the cloud computing platform bring serious security threats, and the access threats of the virtualized network are difficult to be protected by traditional network security equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Trusted Access Authentication System Based on Virtualized Network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the objectives, technical solutions and advantages of the present invention more clearly understood, the embodiments of the present invention will be further described in detail below with reference to the specific embodiments and the accompanying drawings.

[0043] like figure 1 As shown, the present invention proposes a virtualized network-based trusted access authentication system including:

[0044] A virtual trusted access switching component, the virtual trusted access authentication component includes a trusted Open vSwitch 3 and a trusted access switching controller 4, and is configured for network access to virtual machines in the virtual network according to the virtual verification result Authentication provides virtual network support;

[0045] A trusted access authentication component, the trusted access authentication component includes a trusted access authentication client 1 located in a virtual machine in a virtual network and a truste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A trusted access authentication system based on a virtualized network, comprising: a virtual trusted access switching component, the virtual trusted access authentication component includes a trusted Open vSwitch and a trusted access switching controller, configured for Provide virtual network support for network access authentication of virtual machines in the virtual network according to the virtual verification result; a trusted access authentication component, where the trusted access authentication component includes a trusted access authentication client located in the virtual machine in the virtual network terminal and a trusted access authentication server located at the control node; a trusted access management component, the trusted access management component includes an isolation repair server located in a virtual machine in a virtual network and a trusted access terminal located at the control node At the authentication management end, the trusted Open vSwitch includes preset flow table rules with virtual machine network authorization information, and the trusted Open vSwitch provides virtual network support to the virtual machine based on the preset flow table rules. The invention can realize effective control of virtual machine network access.

Description

technical field [0001] The invention relates to a virtualized network, an SDN software-defined network, a TNC trusted network connection and remote certification, in particular to a trusted access authentication system based on a virtualized network. Background technique [0002] The application of cloud computing in social life and daily office environment brings many conveniences, but also brings corresponding security risks and challenges. From a technical point of view, cloud computing realizes the pooling of computing resources, storage resources and network resources in the data center through virtualization technology, which can be allocated and used by users in the cloud center, which brings a lot of convenience to users. The introduction of virtualized resources also brings new risks such as difficult management of virtualized resources and difficult to define the boundaries of virtualized networks. Malicious attackers invade the virtualized network by attacking vir...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L49/00
CPCH04L63/10H04L63/12H04L63/20H04L49/70
Inventor 常双举梁记斌李卫东梁金林
Owner SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD