Enterprise network security access method by means of security authentication gateway
A security authentication gateway and security access technology, which is applied in the field of enterprise network security access with the help of security authentication gateway, can solve the problems of insufficient security and lack of authentication authority, and achieve enhanced security, strong practicability, and guaranteed security. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0029] The PKI security authentication gateway of this embodiment is as follows: figure 1 and figure 2 shown.
[0030] Authentication client: a program installed on the user client to read the certificate and interact with the security authentication gateway.
[0031] Keep alive module: judge whether the traffic reaches the threshold or whether the Token token is valid, and perform a second re-authentication when the traffic reaches the threshold or the Token is invalid.
[0032] Management configuration: It can only be used on the intranet, and is used to initialize the security authentication gateway, configure various policies, and manage rights. Only point-to-point connections can be used for initialization. After initialization, you must hold the administrator's digital certificate to be able to log in to the security authentication gateway for management.
[0033] Log module: Logs that record various events.
[0034] Online user SN query module: It can query the use...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 