Unlock instant, AI-driven research and patent intelligence for your innovation.

Enterprise network security access method by means of security authentication gateway

A security authentication gateway and security access technology, which is applied in the field of enterprise network security access with the help of security authentication gateway, can solve the problems of insufficient security and lack of authentication authority, and achieve enhanced security, strong practicability, and guaranteed security. Effect

Inactive Publication Date: 2005-11-23
JIANGSU ELECTRIC POWER CO
View PDF1 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method fails to organically connect with the CA center (Certificate Authority), so it not only lacks the authority of the certification, but also is still not safe enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enterprise network security access method by means of security authentication gateway
  • Enterprise network security access method by means of security authentication gateway
  • Enterprise network security access method by means of security authentication gateway

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] The PKI security authentication gateway of this embodiment is as follows: figure 1 and figure 2 shown.

[0030] Authentication client: a program installed on the user client to read the certificate and interact with the security authentication gateway.

[0031] Keep alive module: judge whether the traffic reaches the threshold or whether the Token token is valid, and perform a second re-authentication when the traffic reaches the threshold or the Token is invalid.

[0032] Management configuration: It can only be used on the intranet, and is used to initialize the security authentication gateway, configure various policies, and manage rights. Only point-to-point connections can be used for initialization. After initialization, you must hold the administrator's digital certificate to be able to log in to the security authentication gateway for management.

[0033] Log module: Logs that record various events.

[0034] Online user SN query module: It can query the use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention relates to one method to interface corporation net through safe identification net gate, which is located with one safe identification net gate between the dial servo, VPN device and corporation internet and displays user digital certificate through demanding to the CA center for testing the certificate validity and generating random number to the user terminal. The user uses the private key for digital signature and delivering to the safe net gate to process the testing steps and to determine the legal user for safely interfacing.

Description

technical field [0001] The invention relates to a network security access method based on PKI (Public Key Infrastructure) technology, which is used to realize security access to internal and external networks of enterprises and provide security guarantee for remote mobile office. Background technique [0002] When employees are on business trips, they often need to connect to the enterprise intranet for remote office (processing official documents, sending and receiving emails, etc.). network, or use a VPN (Virtual Private Network virtual private network) device to establish a VPN channel to access the intranet. [0003] The advantage of using a dial-up server is that it is simple and fast to deploy. However, using a dial-up server is a very insecure way, and there are many security risks as follows: [0004] ●The phenomenon of account theft is widespread, and the dial-up account cannot be used to determine the real identity of the user or serve as evidence of the user's n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 周光浩祁建张水凌张明明庄岭赵俊峰蔡晶晶唐巍丁一新徐勇王永梅姚楠
Owner JIANGSU ELECTRIC POWER CO