Safety proxy method
A security agent and security channel technology, applied in the fields of information security, identity authentication, authority control, security audit and data encryption and decryption, can solve the problem of single function of security agent, achieve flexible configuration, security key negotiation and security audit, The effect of increasing safety
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0033] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments.
[0034] Fig. 1 is a structural diagram of the business system of the security agent method of the present invention. The business system consists of a client 1 , a business server 3 and a communication network 4 . Wherein, the client refers to the computer system on which the business client 2 is installed, and the business system refers to an existing system based on TCP and UDP / IP protocols.
[0035] Fig. 2 is a structural diagram of secure access to the service system of the security proxy method of the present invention. The secure access to the business system consists of a client 1 , a business server 3 , an authentication server 13 , and a communication network 4 . Wherein, the client refers to a computer system composed of a business client 2, an authentication client 11, and an electronic key 12, and the business system refers to an ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com