System and method for authenticating terminal trusted access
An access authentication and trusted technology, which is applied in the field of network security management, can solve problems such as network system paralysis and end user non-compliance, and achieve the effects of reducing network construction costs, facilitating operation, and solving identity uncertainties
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] Below in conjunction with accompanying drawing and embodiment the present invention is described in further detail:
[0026] The terminal trusted access authentication system of the present invention includes a user identity authentication module and a terminal access authentication module; the user identity authentication module completes the trusted identity authentication of the terminal user; the user identity authentication module includes a CA user certificate and a CA authentication server; the CA authentication The center distributes a USB-Key hardware device for each user, and the CA user certificate, private key and basic user information are stored in the USB-Key hardware device; the USB-Key hardware device can set user passwords and has a USB interface. The trusted access module of the terminal node completes the trusted access authentication of the terminal user; the trusted access module of the terminal node includes an access authentication switch, a CA au...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com