Supercharge Your Innovation With Domain-Expert AI Agents!

VPN client end safety strategy exchange and storage method

A security policy and client technology, applied in the field of security policy storage and exchange, can solve problems such as hindering the popularization of VPN, complicated client configuration, etc., and achieve the effect of convenient use, convenient network management, and improved security.

Inactive Publication Date: 2005-02-16
SANGFOR TECH INC
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the traditional VPN client configuration is very complicated, including configuration of VPN server IP, user name, password, user certificate and many other security policy information
Since the users who use the client are generally not IT professionals, the complicated configuration of the VPN client hinders the popularization of the VPN and increases the maintenance cost after the VPN is deployed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • VPN client end safety strategy exchange and storage method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be described in further detail below in conjunction with accompanying drawing:

[0022] see figure 1 As shown, before distributing the USB storage device of the VPN client, the administrator inserts the USB storage device into the VPN server (gateway) or its control device, and writes the security policy and configuration of the corresponding user in the USB storage device. The writing process Needs to be automated. The user's security configuration policy includes but is not limited to: user name, user private certificate, gateway public key (certificate), gateway IP, VPN system shared key and other configurations of the VPN client. The written security configuration policy is encrypted using the built-in shared key of the gateway and the client program. The encryption algorithm is a symmetric encryption algorithm, which can be but not limited to 3DES, AES and other algorithms.

[0023] In order to ensure the security of storage, an encrypt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method includes following steps: VPN server (network gateway) stores encrypted user's security policy (configuration) on USB storage device; manager through safe means distributes relevant USB storage devices to user, and informs initial cipher; user installs VPN client end distributed, and inserts it into the said relevant USB storage device, automatic or manual staring up VPN client end; VPN client end reads in and decrypts user's security policy stored in USB device; user inputs cipher, using security policy read in, the VPN client end completes validation by the VPN server, and accesses VPN server; user pulls out USB storage device, VPN client end cleans out local security policy and configuration, and exits.

Description

technical field [0001] The invention relates to a method for distributing and exchanging security policies in VPN (virtual private network) technology, in particular to a method for storing and exchanging security policies of VPN clients. Background technique [0002] With the development and application of the Internet and information technology, VPN (Virtual Private Network) technology has become one of the main ways of network interconnection. [0003] However, the traditional VPN client configuration is very complicated, including configuration of VPN server IP, user name, password, user certificate and many other security policy information. Since the users who use the client are generally not IT professionals, the complicated configuration of the VPN client hinders the popularization of the VPN and increases the maintenance cost after the VPN is deployed. Contents of the invention [0004] The purpose of the present invention is to provide a popular safe storage tec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/28
Inventor 何朝曦
Owner SANGFOR TECH INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More