Zero-trust network access system based on block chain

A technology of network access and blockchain, which is applied in the field of zero-trust network access system, can solve the problems of untimely key data sharing and synchronization, inconsistent security, and difficult integration of user identity data, so as to ensure security consistency, The effect of unified control rules and unified data format

Active Publication Date: 2021-06-29
湖南链聚信息科技有限责任公司
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Based on this, the existing zero-trust network access system will have some deficiencies: the trust agent may become a single point of failure; Tokens, user identities and other key data sharing and synchronization problems are not timely, inconsistency, and low security; and when the authorized user group of the application system is cross-organizational entities, cross-country Differences in regulations and system interfaces will face the problem of difficult integration of user identity data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Zero-trust network access system based on block chain
  • Zero-trust network access system based on block chain
  • Zero-trust network access system based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to enable those skilled in the art to better understand the technical solution in the application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the drawings in the embodiment of the application. Obviously, the described implementation Examples are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0026] It should be noted that when an element is referred to as being "fixed" or "disposed on" another element, it may be directly disposed on another element or indirectly disposed on another element; when an element is referred to as being "connected" It may be directly connected to another element or indirectly connected to another element.

[0027] It i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a zero-trust network access system based on a block chain, which is connected with user equipment and an application system requesting access. The system comprises a trust agent component; an access control component connected with the trust agent component, wherein one end of the access control component is connected with the trust agent component, and the other end is connected with an application system; and the access control component and the application system are arranged in a same network; an enterprise directory block chain system which is used for storing and distributing the key data accessed by the zero-trust network, and comprising a plurality of block chain consensus nodes, wherein the block chain consensus nodes are communicated with the trust agent component, the access control component and the application system. Compared with the prior art, the system has the advantages that the problem of single-point failure can be solved, the key data in network access can be timely and consistently shared and synchronously updated, the data formats and control rules are unified, and the safe and efficient integration is realized.

Description

technical field [0001] This application relates to the field of blockchain technology, and more specifically, to a zero-trust network access system based on blockchain. Background technique [0002] Zero Trust Network Access (ZTNA for short) is a set of products and services that create a logical access boundary based on identity and context, which encloses a user and an application or a group of applications. ZTNA's access policy is mainly based on the identity of users, devices, and applications, and only allows access to specific applications or application systems, not the underlying network. Compared with traditional methods such as VPN and DMZ, ZTNA restricts users from excessive access to all ports and protocols or all applications, avoiding the risk of arbitrary system intrusion. [0003] At present, the typical zero-trust network access system architecture mainly includes: endpoint-enabled ZTNA and service-enabled ZTNA, and there are actually products that mix thes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/27G06F16/23G06F21/33
CPCG06F16/27G06F16/2365G06F21/33
Inventor 贺梅青
Owner 湖南链聚信息科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products