Unlock instant, AI-driven research and patent intelligence for your innovation.

Application access method, device and computing device in zero trust

An access method and access gateway technology, applied in the field of computer networks, can solve problems such as no reliable access mechanism, no identity and authority verification, security risks, etc., and achieve the effect of consistent experience

Active Publication Date: 2022-05-31
深圳竹云科技股份有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method does not have continuous identity and permission verification, nor a reliable access mechanism, which will bring security risks to the application, does not meet the requirements of zero trust security, and requires the cooperation of other components to be used safely

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application access method, device and computing device in zero trust
  • Application access method, device and computing device in zero trust
  • Application access method, device and computing device in zero trust

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. Although the drawings show the invention

[0028] FIG. 1 shows a schematic structural diagram of an application access gateway system in zero trust provided by an embodiment of the present invention. like

[0032] The application access gateway system of the embodiment of the present invention provides an application with a solution that meets the zero-trust security requirements.

[0033] FIG. 4 shows a schematic flowchart of an application access method in zero trust provided by an embodiment of the present invention. this method

[0034] Step S11: when the user initiates access, the application access gateway initiates a penetrating proxy network to connect to the secure access network

[0036] Step S12: If the terminal agent and the application access gateway are not in the same network segment, connect the

[0038] Step S13: If the termin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention relates to the field of computer network technology, and discloses an application access method, an application access gateway, and a gateway system in zero trust. The method includes: when a user initiates access, the application access gateway initiates a network penetration proxy Connect to the secure access gateway and establish a network channel; if the terminal agent and the application access gateway are not in the same network segment, receive the access request sent by the terminal agent through the network channel to access the application and send the application feedback request to the terminal agent through the network channel; If they are on the same network segment, the terminal agent is directly connected to the application access gateway through the security access gateway according to the same network segment information, directly receives the access request sent by the terminal agent to access the application, and directly feeds back the application feedback request to the terminal agent. Through the above method, the embodiment of the present invention can perform application deployment under the mixed-match situation of public cloud and private cloud, so as to realize the consistency of experience of users accessing the application inside and outside the network.

Description

Application access method, device and computing device in zero trust technical field Embodiments of the present invention relate to the technical field of computer networks, and in particular to an application access party in zero trust methods, devices and computing equipment. Background technique [0002] In the mobile office environment, a virtual private network (Virtual Private Network, VPN) is usually used. Internet, VPN itself is based on network security, once it is breached, it will lead to insecure applications on the entire network, so the proposed A zero-trust network based on application security, because it runs with the least privilege, even if it is compromised, all applications will not be in the High risk, but the zero trust network architecture of existing vendors is not suitable for complex network environments, such as private cloud and public cloud hybrid The agency has certain limitations. The prior art can utilize the authentication strategy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/10H04L63/02H04L63/08
Inventor 范端胜赵静谧王泽峰
Owner 深圳竹云科技股份有限公司