Service hiding architecture based on zero-trust model and implementation method

A technology of trust model and implementation method, which is applied in the field of information security to achieve the effect of reducing risk exposure, increasing the difficulty of network attacks, and reducing security risk points

Pending Publication Date: 2022-04-26
安徽省广播电视监测台 +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the traditional network attacks are based on the TCP protocol, and SDP controllers and PDPs have become clear attack targets.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service hiding architecture based on zero-trust model and implementation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0022] In the present invention, unless otherwise clearly specified and limited, terms such as "installation", "connection", "connection" and "fixation" should be understood in a broad sense, for example, it can be a fixed connection or a detachable connection , or integrated; it can be mechanically connected or electrically connected; it can be directly connected or indirectly connected through an intermediary, and it can be the internal communication of two c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of information security, in particular to a service hiding architecture based on a zero-trust model and an implementation method.The service hiding architecture comprises a zero-trust security control center and a zero-trust security agent component, and the zero-trust security control center is arranged on the inner side of the zero-trust security agent component; all synchronous execution protocols of communication before SDP knock are changed into asynchronous execution protocols, only an access subject is allowed to send a UDP and forward the UDP to a zero-trust security control center through a zero-trust security agent component, and the zero-trust security control center returns a response result to the access subject through other security channels such as emails and short messages. According to the service hiding architecture based on the zero-trust model and the implementation method, the zero-trust security control center is deployed on the inner side of the zero-trust security agent component, so that the risk exposure surface of a zero-trust system is reduced; the thought of replacing a traditional TCP with an asynchronous UDP protocol is adopted, it is guaranteed that an access subject cannot establish TCP connection before authentication is passed through the protocol design, and the network attack difficulty is greatly improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a zero-trust model-based service hiding architecture and an implementation method. Background technique [0002] Zero trust is a new security protection concept for the digital age, a network security paradigm centered on resource protection, and dynamic access control centered on identity. Zero trust processes data access and authentication verification between the access subject and the access object, and it decomposes the general access behavior into a control plane for network communication control and a data plane for application communication. The access subject initiates an access request through the control plane, implements identity authentication through the trust evaluation engine and access control engine, and obtains permission before accessing the business application, thereby establishing a credible and secure access link. [0003] Zero trust products...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L69/164H04L69/165H04L9/40
CPCH04L69/164H04L69/165H04L63/0281H04L63/0884
Inventor 胡宝胜查正朋袁秋谨王佳宁盛承红梅岩徐健吴俊昌操昕李卫东
Owner 安徽省广播电视监测台
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products