Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety proxy method

A security agent and security channel technology, applied in the fields of information security, identity authentication, authority control, security audit and data encryption and decryption, can solve the problem of single function of security agent, achieve flexible configuration, security key negotiation and security audit, The effect of increasing safety

Active Publication Date: 2007-05-02
ZTE CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a kind of safe agent method, overcome the shortcoming of current single function of safe agent, solve on the basis of not changing the software and hardware of existing application system (based on TCP, UDP / IP agreement), improve the identity of application system Technical Issues of Authentication Strength and System Security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety proxy method
  • Safety proxy method
  • Safety proxy method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments.

[0034] Fig. 1 is a structural diagram of the business system of the security agent method of the present invention. The business system consists of a client 1 , a business server 3 and a communication network 4 . Wherein, the client refers to the computer system on which the business client 2 is installed, and the business system refers to an existing system based on TCP and UDP / IP protocols.

[0035] Fig. 2 is a structural diagram of secure access to the service system of the security proxy method of the present invention. The secure access to the business system consists of a client 1 , a business server 3 , an authentication server 13 , and a communication network 4 . Wherein, the client refers to a computer system composed of a business client 2, an authentication client 11, and an electronic key 12, and the business system refers to an ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety proxy method for realizing port based safety proxy mode through employing an identification mode integrating digital certificate and electronic key and authority control combining digital certificate, wherein no amendment on the existing applied system for hardware and software is required to improve the identification intensity of the existing applied systems.

Description

technical field [0001] The invention relates to the field of information security, in particular to the fields of identity authentication, authority control, security audit and data encryption and decryption in information security. Background technique [0002] Safe, reliable and effective access to computer network information resources is the key to information system security, and identity authentication technology is its main means of realization. Broad identity authentication technologies include Authentication, Authorization, and Audit, which are commonly referred to as 3A. [0003] Authentication refers to the process of verifying the claimed identity of an end user or device (eg, client, server, switch, router, firewall, etc.). Authentication methods are generally divided into "local authentication" methods and "trusted third-party" methods, that is, a method in which a trusted authority provides authentication confirmation. In many existing application systems, s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00
Inventor 袁泉卢玉峰李栎田学锋芦东昕
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products