Unlock instant, AI-driven research and patent intelligence for your innovation.

Application access method and device in zero trust and computing equipment

An access method and access gateway technology, applied in the field of computer networks, can solve the problems of no reliable access mechanism, no identity and authority verification, security risks, etc., and achieve the effect of achieving experience consistency

Active Publication Date: 2021-09-21
深圳竹云科技股份有限公司
View PDF10 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method does not have continuous identity and permission verification, nor a reliable access mechanism, which will bring security risks to the application, does not meet the requirements of zero trust security, and requires the cooperation of other components to be used safely

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application access method and device in zero trust and computing equipment
  • Application access method and device in zero trust and computing equipment
  • Application access method and device in zero trust and computing equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present invention are shown in the drawings, it should be understood that the invention may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present invention and to fully convey the scope of the present invention to those skilled in the art.

[0028] figure 1 A schematic structural diagram of an application access gateway system in zero trust provided by an embodiment of the present invention is shown. Such as figure 1 As shown, the application access gateway system in zero trust includes: a terminal agent, a secure access gateway connected to the terminal agent, and an application access gateway connected to the secure access gateway. The application access gateway system further ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to the technical field of computer networks, and discloses an application access method and gateway in zero trust and a gateway system. The method comprises the steps that when a user initiates access, the application access gateway initiates a proxy-penetrating network to be connected to a security access gateway, and a network channel is established; if the terminal agent and the application access gateway are not in the same network segment, an access request sent by the terminal agent is received through the network channel to access the application, and an application feedback request is transmitted to the terminal agent through the network channel; if in the same network segment, direct connection between the terminal agent and the application access gateway is performed through the security access gateway according to the information of the same network segment, an access request sent by the terminal agent is directly received to access the application, and an application feedback request is directly fed back to the terminal agent. By means of the mode, application deployment can be conducted under the condition that the public cloud and the private cloud are mixed and matched, and the experience consistency of the user accessing the internal and external networks of the application is achieved.

Description

technical field [0001] Embodiments of the present invention relate to the technical field of computer networks, and in particular to an application access method, device and computing equipment in zero trust. Background technique [0002] In the mobile office environment, a virtual private network (Virtual Private Network, VPN) is usually used to access the Internet. The VPN itself is based on network security. Once broken, it will lead to insecure applications on the entire network. Therefore, a zero-trust network based on application security is proposed. , because it runs with least privilege, even if it is compromised, all applications will not be at high risk. However, the zero-trust network architecture of existing manufacturers has certain limitations for complex network environments, such as the hybrid deployment of private clouds and public clouds. [0003] Existing technologies can use multi-factor authentication (Multi-factor authentication, MFA) authentication po...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/10H04L63/02H04L63/08
Inventor 范端胜赵静谧王泽峰
Owner 深圳竹云科技股份有限公司