Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security service system, access control method and computer readable storage medium

A technology of security services and servers, applied in the field of computer-readable storage media and security service systems, can solve the problems of cost, difficulty in deployment and implementation, and huge number of resources.

Active Publication Date: 2022-06-17
中电科网络安全科技股份有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the independence and security of the protected resources, a hardware protection device is configured for each protected resource. However, if the number of resources to be protected is huge, there are great difficulties in cost and deployment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security service system, access control method and computer readable storage medium
  • Security service system, access control method and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035]The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Apparently, the described embodiments are only some of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application. In addition, in the embodiments of the present application, "first", "second", etc. are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence.

[0036] The embodiment of the present application discloses a security service system, which not only satisfies the independence of security policy execution points, but also satisfies the security of protected resources.

[0037] see figure 1 , a structural diagram of a security ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security service system, an access control method, a computer readable storage medium, a security service system user terminal, gateway equipment and a service server, the gateway equipment comprises a plurality of virtual gateway units, a virtual switch and a shunt, and the virtual switch is connected with each virtual gateway unit and the shunt; the different virtual gateway units are isolated through different containers, each virtual gateway unit is provided with a first virtual network interface and a second virtual network interface which are independent, the first virtual network interface is used for communicating with a user terminal, and the second virtual network interface is used for communicating with a service server corresponding to the virtual gateway unit; the virtual gateway unit is used for carrying out authority verification on the sending user terminal of the access request received by the first virtual network interface by using the security policy of the corresponding service server, and after the authority verification is passed, the virtual gateway unit is used for realizing communication between the sending user terminal and the service server corresponding to the virtual gateway unit.

Description

technical field [0001] The present application relates to the field of computer technology, and more specifically, to a security service system, an access control method and a computer-readable storage medium. Background technique [0002] IPSEC (Internet Protocol Security) stands for Internet Protocol Security. It is an open standard framework structure that ensures confidential and secure communication on the Internet Protocol network by establishing a secure tunnel based on cryptographic technology between the two communicating parties. IKE (Internet Key Exchange) represents the Internet key exchange protocol, which solves the problem of securely establishing or updating shared keys in insecure network environments such as the Internet. VPN (Virtual Private Network, Virtual Private Network) refers to the technology of establishing a private network on a public network, which covers the extension of a private network across a shared network or public network encapsulation,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L12/66H04L41/0803H04L41/0895
CPCH04L63/0272H04L63/0281H04L63/205H04L63/101H04L63/08H04L12/66H04L41/0803
Inventor 罗俊
Owner 中电科网络安全科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products