Policy-based data transmission authentication method
A data transmission and authentication method technology, applied in the field of data transmission, can solve the problems of ineffective identification of equipment and counterfeiting of information attackers, and achieve the effects of reducing the risk of equipment being counterfeited, enhancing security, and strengthening control
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in combination with specific embodiments and with reference to the accompanying drawings. It should be understood that these descriptions are exemplary only, and are not intended to limit the scope of the present invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present invention.
[0030] In a specific embodiment, the present invention provides a policy-based data transmission authentication method, and the method of the present invention is applicable to security isolation devices for communication control at two network boundaries.
[0031] Specifically, in the method of the present invention, an authentication module is respectively added to the transmission equipment and the isolation device, an...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
