A terminal trusted access authentication system and method
An access authentication and credible technology, applied in the field of network security management, can solve problems such as network system paralysis and non-compliance of end users, and achieve the effect of reducing network construction cost, easy operation, and solving identity uncertainty.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] The present invention will be further described in detail below with reference to the drawings and embodiments:
[0026] The terminal trusted access authentication system of the present invention includes a user identity authentication module and a terminal access authentication module; the user identity authentication module completes the trusted identity authentication of the terminal user; the user identity authentication module includes a CA user certificate and a CA authentication server; CA authentication The center distributes a USB-Key hardware device for each user. The CA user certificate, private key and basic user information are stored in the USB-Key hardware device; the USB-Key hardware device can set user passwords and has a USB interface. The terminal node trusted access module completes the trusted access authentication of the terminal user; the terminal node trusted access module includes the access authentication switch, the CA authentication server and th...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com