Web service mapping method and system of security proxy in vpn

A technology of security proxy and mapping method, which is applied in the field of communication, can solve problems such as complex code and difficult analysis of Web response, and achieve the effect of simple implementation, improved request and response speed and efficiency, and simplified analysis and rewriting process

Active Publication Date: 2016-04-13
ARRAY NETWORKS BEIJING
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The inventors of the present invention have found that the traditional application layer VPN needs to analyze and understand the content of the Web application, and by rewriting the content, the request sent by the user's browser will pass through the VPN, so as to realize the SSL security proxy. This method will have the following problems , as the code written in Javascirpt becomes more and more complex, it becomes more and more difficult to parse the web response. At the same time, the web technology is constantly updated, such as RSS, etc., and the support for these new technologies must be continuously increased. Therefore, it is necessary to develop a A technique to simplify the process of parsing and rewriting web responses to solve the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web service mapping method and system of security proxy in vpn
  • Web service mapping method and system of security proxy in vpn
  • Web service mapping method and system of security proxy in vpn

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In the following description, many technical details are proposed in order to enable readers to better understand the application. However, those skilled in the art can understand that without these technical details and various changes and modifications based on the following implementation modes, the technical solution claimed in each claim of the present application can be realized.

[0034] In order to make the purpose, technical solution and advantages of the present invention clearer, the following will further describe the implementation of the present invention in detail in conjunction with the accompanying drawings.

[0035] The first embodiment of the present invention relates to a Web service mapping method of a security agent in a VPN. figure 1 It is a flow diagram of the method for mapping Web services of the security agent in the VPN. In the method for mapping web services of a security proxy in the VPN, the security proxy in the VPN is preset to provide a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of communications, and discloses a web service mapping method and a system of a security agent in a virtual private network (VPN). Web response analysis and rewriting processes are simplified, achieving is easy, and stability and efficiency are high. In the web service mapping method and the system of the security agent in the VPN, the mapping relation of a domain name or a port which supplies web services and security agents is preset by the security agent in the VPN, wherein different web services correspond to different domain names or different ports. When the security agent receives a web service request from a client terminal, a corresponding web service is found from the mapping relation according to the domain name in the request or the port which receives the request, and the request is forwarded to a web server which supplies the web service. When the security agent receives a web response from the web server, according to the mapping relation, chaining which points to the web service in the web response is replaced by chaining which points to a corresponding domain name or a corresponding port of the security agent, and then the replaced web response is forwarded to the client terminal.

Description

technical field [0001] The invention relates to the communication field, in particular to the Web service mapping technology of the security agent in the VPN. Background technique [0002] Virtual Private Network (Virtual Private Networking, referred to as "VPN") mainly uses the protocol Internet Protocol Security (Internet Protocol Security, referred to as "IPSec"), Point-to-Point Tunneling Protocol (Point to Point Tunneling Protocol, referred to as "PPTP"), the second layer forwarding (protocol) (Layer2Forwarding, "L2F" for short) and Layer 2 Tunnel Protocol (Layer2TunnelProtocol, "L2TP" for short), etc.; SSLVPN refers to a VPN technology that uses the Secure Socket Layer (Secure Socket Layer, "SSL" for short) protocol to achieve remote access. The SSL protocol is a security protocol proposed by Netscape, which includes: server authentication, client authentication (optional), data integrity and data confidentiality authentication on the SSL link. Domain name resolution i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/12H04L12/46
Inventor 段木全刘升郑凤顺胡延锐
Owner ARRAY NETWORKS BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products