Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A blockchain-based zero-trust network access system

A network access and blockchain technology, applied in the field of zero-trust network access system, can solve problems such as inconsistent security, difficult integration of user identity data, key data sharing and untimely synchronization, etc., to ensure security consistency, The effect of unified data format and unified control rules

Active Publication Date: 2022-05-27
湖南链聚信息科技有限责任公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Based on this, the existing zero-trust network access system will have some deficiencies: the trust agent may become a single point of failure; Tokens, user identities and other key data sharing and synchronization problems are not timely, inconsistency, and low security; and when the authorized user group of the application system is cross-organizational entities, cross-country Differences in regulations and system interfaces will face the problem of difficult integration of user identity data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A blockchain-based zero-trust network access system
  • A blockchain-based zero-trust network access system
  • A blockchain-based zero-trust network access system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order for those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described implementation The examples are only some of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.

[0026] It should be noted that when an element is referred to as being "fixed" or "disposed on" another element, it can be directly or indirectly disposed on the other element; when an element is referred to as being "connected" "to" another element, it may be directly connected to another element or indirectly con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The blockchain-based zero-trust network access system disclosed in this application connects user equipment and application systems that request access, including: a trust proxy component; an access control component connected to the trust proxy component; the access control component One end is connected to the trust agent component, and the other end is connected to the application system; the access control component and the application system are set in the same network; the enterprise directory block for storing and distributing key data accessed by the zero-trust network chain system; the enterprise directory block chain system includes a plurality of block chain consensus nodes; the block chain consensus nodes communicate with the trust agent component, the access control component and the application system. Compared with the existing technology, it can solve the single point of failure problem, can share and update key data in network access in a timely and consistent manner, unify data format and control rules, and realize safe and efficient integration.

Description

technical field [0001] The present application relates to the field of blockchain technology, and more specifically, to a zero-trust network access system based on blockchain. Background technique [0002] Zero Trust Network Access (ZTNA for short) is a product and service that creates an identity- and context-based logical access boundary that encloses a user and an application or group of applications. The access policy of ZTNA is mainly based on the identities of users, devices and applications, and only allows access to specific applications or application systems, rather than the underlying network. Compared with traditional methods such as VPN and DMZ, ZTNA restricts users' excessive access to all ports and protocols or all applications, avoiding the risk of arbitrary intrusion of the system. [0003] At present, the typical zero-trust network access system architecture mainly includes: endpoint startup ZTNA and service startup ZTNA, and there are actually products on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/27G06F16/23G06F21/33
CPCG06F16/27G06F16/2365G06F21/33
Inventor 贺梅青
Owner 湖南链聚信息科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products