[go: up one dir, main page]

CN118102297A - Construction method and system of mobile enterprise private line based on 5G slicing - Google Patents

Construction method and system of mobile enterprise private line based on 5G slicing Download PDF

Info

Publication number
CN118102297A
CN118102297A CN202410103265.8A CN202410103265A CN118102297A CN 118102297 A CN118102297 A CN 118102297A CN 202410103265 A CN202410103265 A CN 202410103265A CN 118102297 A CN118102297 A CN 118102297A
Authority
CN
China
Prior art keywords
enterprise
cpe
authentication control
control gateway
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410103265.8A
Other languages
Chinese (zh)
Inventor
陈志峰
余明旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Hotspot Software Technology Co ltd
Original Assignee
Guangzhou Hotspot Software Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Hotspot Software Technology Co ltd filed Critical Guangzhou Hotspot Software Technology Co ltd
Priority to CN202410103265.8A priority Critical patent/CN118102297A/en
Publication of CN118102297A publication Critical patent/CN118102297A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/71Hardware identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/72Subscriber identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a method and a system for constructing a mobile enterprise private line based on 5G slicing, which introduces the high-bandwidth, low-delay, virtualization and low-cost slicing deployment technology of 5G, utilizes 5G CPE to construct a C-end and enterprise side-shifting private line, provides a matched operation management system, realizes the functions of opening and closing enterprise private line business, secondary authentication of employee identity, trusted authentication of CPE, flow control and the like, and has the beneficial effects that: better cost-effectiveness than traditional Internet VPN scheme, no need to deploy expensive and complex optical fiber line network equipment, and simultaneously can obtain high bandwidth low time delay experience with the same grade as gigabit optical fiber, higher safety characteristic than traditional Internet VPN scheme, and no public network exposure from line end to end; a variety of authentication authorizations for identity and devices; the system has high-level security, and can meet the related requirements of equivalent protection 2.0; the system can control the access of the user in real time, and meet the behavior audit required by network regulations, and is flexible in enterprise private line networking deployment capability.

Description

Construction method and system of mobile enterprise private line based on 5G slicing
Technical Field
The invention relates to the technical field of enterprise private line construction, in particular to a method and a system for constructing a mobile enterprise private line based on 5G slicing.
Background
With the rapid development of mobile internet, more and more enterprises allow employees to remotely work or access resources inside the enterprise in an external network environment. In general, the access mode is through VPN (Virtual Private Network ), that is, a secure encryption channel can be established on the public network by using VPN, so that staff can access the intranet resources of the company through the internet. Through VPN connection, after identity security verification, data transmission of staff is encrypted and protected, and data security is ensured.
The 5G private network is a private network based on a 5G slicing technology and is mainly used for communication and data transmission in enterprises and institutions. Compared with the traditional public network, the 5G private network has higher security, higher reliability, lower delay and higher bandwidth, and can meet the requirements of enterprises and institutions on high speed, low delay, high reliability and high security of the network. And a Local Area Network (LAN) is a special network which is created by using a 5G network slicing technology and has unified connectivity, optimized service function and ensured communication safety in a specific area, and provides professional communication service for specific users in links of organization, management, production, scheduling and the like.
CPE is known collectively as Customer Premise Equipment and is referred to in the industry as a "customer premise equipment". Premise refers to "front end" and refers to "front side" of a terminal device (e.g., smart phone, tablet, computer, etc.). The function is to convert the mobile network signals (4G, 5G, etc.) or the wired broadband signals into local signals for the terminal equipment.
Under a 5G dual-domain private network environment, a 5G CPE terminal is widely applied as a device for converting a 5G network into Wi-Fi signals for connecting and using various devices, so that various non-5G network terminals can access the 5G private network through the 5G CPE device. In an application scene facing to a personal user, particularly in enterprise, education and government affair scenes, the user can access a 5G private network to a non-5G terminal such as a personal PC (personal computer), a tablet personal computer and the like in any 5G signal coverage range, so that intranet resources are safely accessed.
However, due to the positioning and characteristics of the products of the 5G CPE equipment, the enterprise side secondary authentication and security authentication system of the 5G private network cannot effectively identify the trusted identity of the Wi-Fi terminal accessed to the 5G CPE equipment, so that the 5G CPE equipment becomes a potential security hole of the 5G private network.
Meanwhile, the conventional VPN technology has a series of problems in enterprise communication:
the VPN needs an Internet optical fiber circuit with fixed IP, the circuit cost, the maintenance cost and the technical requirements on maintenance personnel are relatively high, and a small enterprise is relatively high;
Security problem for vpn: the security of VPN mainly depends on encryption technology, but if the encryption algorithm is cracked, or the user equipment is attacked by malicious software, the internal resources of the enterprise may be at risk of leakage;
Connection stability problem for vpn: the stability of a VPN connection is affected by a number of factors including the performance of the user equipment, the network quality, the load of the VPN server, etc. If the connection is unstable, data transmission is possibly interrupted, and the working efficiency of staff is affected;
vpn access speed problem: VPN requires data transmission through the public internet, and thus the access speed may be affected by factors such as network congestion and bandwidth limitation. This can be a serious problem for application scenarios that require quick access to resources inside the enterprise;
5. identity authentication mode safety problem of VPN: the authentication mode based on account passwords is low in security level, the VPN server and the authentication process are exposed on the public network, and the VPN authentication system has security holes which are attacked, intercepted, injected and cracked.
Disclosure of Invention
The invention aims to provide a method and a system for constructing a mobile enterprise private line based on 5G slicing, which introduce the high-bandwidth, low-delay, virtualization and low-cost slicing deployment technology of 5G, utilize 5G CPE to construct a C-terminal and enterprise side-shifting private line, and provide a matched operation management system to realize the functions of opening and closing enterprise private line business, secondary authentication of employee identity, CPE trusted authentication, flow control and the like so as to solve the problems in the prior art.
In order to achieve the above purpose, the present invention provides the following technical solutions:
The construction method of the mobile enterprise private line based on the 5G slice comprises an authentication control gateway, user side CPE equipment and enterprise side CPE equipment, and specifically comprises the following steps:
S1, inserting SIM cards of a signed 5G private network into customer side CPE equipment and enterprise side CPE equipment, and completing first authentication by a 5G core network;
S2, the authentication control gateway system opens an enterprise account and an employee account of the enterprise, the 5G core network SMF initiates a Radius secondary authentication request to the authentication control gateway through UPF, and the authentication control gateway verifies whether the mobile phone number of the local system of the gateway is legal;
S3, the authentication control gateway system respectively binds the IMEI and the VNI of the enterprise account and the employee account of the enterprise, the CPE automatically uploads the IMEI and the VNI of the CPE to the authentication control gateway system, and whether the enterprise account and the employee account binding IMEI and the VNI of the enterprise are matched is checked;
s4, the Wi-Fi terminal of the user is connected with the SSID of the CPE of the user side, the Wi-Fi terminal sends a DHCP request, the DHCP request packet is transmitted to an authentication control gateway through a VXLAN tunnel, and the authentication control gateway checks whether the CPE VNI of the user side in the data packet is legal or not;
s5, the Wi-Fi terminal of the user submits an employee account password to an authentication control gateway for identity verification through a WEB, weChat or APP authentication mode;
S6, after the identity verification in the S5 is passed, the authentication control gateway performs online processing on the employee account, and maps an IP (Internet protocol) of the same network segment as the enterprise side application in a gateway NAT address pool;
And S7, accessing the enterprise side application by the user Wi-Fi terminal, and performing network behavior management, flow control and access log audit on the user Wi-Fi terminal by the authentication control gateway.
As a preferred embodiment of the present invention: and the authentication control gateway in the S2 verifies the mobile phone number of the gateway local system, if the mobile phone number is legal, the mobile phone number and the source IP are processed online, and if the mobile phone number is illegal, the data packet corresponding to the source IP is refused to respond.
As a preferred embodiment of the present invention: in the step S3, the authentication control gateway system verifies whether the enterprise account number and the employee account number binding IMEI and VNI of the enterprise are matched, if the enterprise account number and the employee account number binding IMEI and VNI of the enterprise are matched, the authentication control gateway system responds to the data packet of the CPE on the enterprise side and the CPE on the user side, establishes a VXLAN tunnel with the CPE on the enterprise side and the CPE on the user side, and if the enterprise account number and the employee account number binding IMEI and VNI of the enterprise are not matched, refuses to respond to the data packet of the source IP corresponding to the CPE.
As a preferred embodiment of the present invention: in the step S4, the authentication control gateway verifies whether the CPE VNI of the user side in the data packet is legal or not, if the CPE VNI of the user side is legal, the authentication control gateway normally responds to a DHCP request message, and the Wi-Fi terminal of the user normally acquires the IP; if the CPE VNI at the user side is illegal, the authentication control gateway refuses to respond to the DHCP request message.
Compared with the prior art, the invention has the beneficial effects that:
1. Better cost effectiveness than traditional internet VPN solutions: compared with the characteristic that the conventional VPN special line requires enterprises to deploy fixed optical fiber lines, the patent provides a mobile enterprise special line deployment scheme based on 5G CPE and 5G slicing for the enterprises, the user side and the enterprise side both use 5G air interface links, expensive and complex optical fiber line network equipment is not required to be deployed, and meanwhile high-bandwidth low-delay experience with the same grade as gigabit optical fiber can be obtained;
2. Higher security features than traditional internet VPN schemes: compared with the traditional VPN exposure public network, the method has the advantages of single authentication means and no trusted authentication, and the patent has the advantages that: 1) The end-to-end public network of the line is not exposed; 2) The mobile phone numbers of CPE equipment, enterprises and staff are subjected to various verification and authorization of identities and equipment; 3) The authentication and verification processes are completed in the core network of the mobile operator, so that the mobile operator has high-level security assurance and can meet the relevant requirements of 2.0 of the equivalent assurance; 4) Real-time access control can be carried out on user access, and behavior audit meeting network regulation requirements can be carried out;
3. flexible enterprise private line networking deployment capability: and flexible enterprise account number and VXLAN service binding are provided, so that a 5G operator can realize flexible enterprise private line rapid networking and private line service full life cycle management.
Drawings
FIG. 1 is a deployment diagram of the present invention;
fig. 2 is a structural diagram of the components of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1 and 2, the present invention provides a technical solution:
The construction method of the mobile enterprise private line based on the 5G slice comprises an authentication control gateway, user side CPE equipment and enterprise side CPE equipment, and specifically comprises the following steps:
S1, inserting SIM cards of a signed 5G private network into customer side CPE equipment and enterprise side CPE equipment, and completing first authentication by a 5G core network;
S2, the authentication control gateway system opens an enterprise account and an employee account of the enterprise, the 5G core network SMF initiates a Radius secondary authentication request to the authentication control gateway through UPF, and the authentication control gateway verifies whether the mobile phone number of the local system of the gateway is legal;
S3, the authentication control gateway system respectively binds the IMEI and the VNI of the enterprise account and the employee account of the enterprise, the CPE automatically uploads the IMEI and the VNI of the CPE to the authentication control gateway system, and whether the enterprise account and the employee account binding IMEI and the VNI of the enterprise are matched is checked;
s4, the Wi-Fi terminal of the user is connected with the SSID of the CPE of the user side, the Wi-Fi terminal sends a DHCP request, the DHCP request packet is transmitted to an authentication control gateway through a VXLAN tunnel, and the authentication control gateway checks whether the CPE VNI of the user side in the data packet is legal or not;
s5, the Wi-Fi terminal of the user submits an employee account password to an authentication control gateway for identity verification through a WEB, weChat or APP authentication mode;
S6, after the identity verification in S5 is passed, the authentication control gateway carries out online processing on the employee account, and maps an IP (Internet protocol) of the same network segment as the enterprise side application in a gateway NAT address pool;
And S7, accessing the enterprise side application by the user Wi-Fi terminal, and performing network behavior management, flow control and access log audit on the user Wi-Fi terminal by the authentication control gateway.
Further, the authentication control gateway in S2 verifies the mobile phone number of the gateway local system, if the mobile phone number is legal, the mobile phone number and the source IP are processed online, and if the mobile phone number is illegal, the data packet corresponding to the source IP is refused to be responded.
Further, in the step S3, the authentication control gateway system verifies whether the enterprise account number and the employee account number binding IMEI and VNI of the enterprise are matched, if the enterprise account number and the employee account number binding IMEI and VNI of the enterprise are matched, the authentication control gateway system responds to the data packet of the CPE on the enterprise side and the CPE on the user side, establishes a VXLAN tunnel with the CPE on the enterprise side and the CPE on the user side, and if the enterprise account number and the employee account number binding IMEI and VNI of the enterprise are not matched, refuses to respond to the data packet of the source IP corresponding to the CPE.
Further, in the step S4, the authentication control gateway verifies whether the CPE VNI of the user side in the data packet is legal or not, if the CPE VNI of the user side is legal, the authentication control gateway normally responds to the DHCP request message, and the Wi-Fi terminal of the user normally acquires the IP; if the CPE VNI at the user side is illegal, the authentication control gateway refuses to respond to the DHCP request message.
Specifically, when in use, the specific operation steps are as follows:
1. the enterprise side CPE and the user side CPE are inserted into SIM cards of the contracted 5G private network (slice), and the 5G core network completes the first authentication, so that the enterprise side CPE and the user side CPE are in the same 5G virtual private network with the authentication control gateway after being accessed into the 5G network;
2. The authentication control gateway system opens an enterprise account and an employee account of an enterprise in advance, wherein the account is a mobile phone number, the 5G core network SMF initiates a Radius secondary authentication request to the authentication control gateway through UPF, authentication contents are mobile phone numbers of CPE (customer premise equipment) at the enterprise side and the user side, the authentication control gateway verifies whether the mobile phone number of the gateway local system is legal or not, if the mobile phone number is legal, the mobile phone number and the source IP are processed online, and if the mobile phone number is illegal, the mobile phone number is refused to respond to a data packet corresponding to the source IP;
3. the authentication control gateway system binds IMEI and VNI (VXLAN ID) of enterprise side CPE and employee account of enterprise respectively in advance, CPE uploads self IMEI and VNI to the authentication control gateway system automatically, the authentication control gateway system checks whether the enterprise account and employee account binding IMEI and VNI of enterprise match, if match, the authentication control gateway system responds to the data packet of enterprise side and user side CPE, establishes VXLAN tunnel with enterprise side and user side CPE, if not match, refuses to respond to the data packet of corresponding source IP of CPE;
4. The user Wi-Fi terminal is connected with the SSID of the user-side CPE, the Wi-Fi terminal sends a DHCP request, the DHCP request packet is transmitted to the authentication control gateway through the VXLAN tunnel, the authentication control gateway checks whether the user-side CPE VNI in the data packet is legal, if so, the user Wi-Fi terminal normally responds to the DHCP request message, and the user Wi-Fi terminal normally acquires the IP; if not, the authentication control gateway refuses to respond to the DHCP request message;
5. The Wi-Fi terminal of the user submits an employee account password to the authentication control gateway for identity verification through a WEB, weChat or APP authentication mode;
6. after the authentication is passed, the authentication control gateway performs online processing on the employee account, and maps an IP (Internet protocol) with the same network segment as the enterprise side application in a gateway NAT address pool;
7. the user Wi-Fi terminal accesses the enterprise application, and the authentication control gateway carries out network behavior management, flow control and access log audit on the user Wi-Fi terminal.
Under the operation steps, an authentication control gateway with an agent private connection prevention function sends a core network to a mobile phone number of the authentication control gateway for secondary authentication, and a five-membered binding relationship is established between the core network and an enterprise account, an employee account, a VXLAN network identifier VNI (VXLAN Network ID) and CPE equipment IMEI; the south-north directions of the authentication control gateway support VXLAN tunnel functions, can carry out NAT address mapping on employee accounts of enterprises according to the VNIs bound by the enterprise accounts, and forward data to the VXLAN tunnels of the bound VNIs; CPE equipment which completes the functions of the patent with the authentication control gateway can automatically upload own IMEI and VNI information to the authentication control gateway so as to carry out verification authorization on the authentication control gateway.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (4)

1. The construction method of the mobile enterprise private line based on the 5G slice comprises an authentication control gateway, user side CPE equipment and enterprise side CPE equipment, and is characterized by comprising the following steps:
S1, inserting SIM cards of a signed 5G private network into customer side CPE equipment and enterprise side CPE equipment, and completing first authentication by a 5G core network;
S2, the authentication control gateway system opens an enterprise account and an employee account of the enterprise, the 5G core network SMF initiates a Radius secondary authentication request to the authentication control gateway through UPF, and the authentication control gateway verifies whether the mobile phone number of the local system of the gateway is legal;
S3, the authentication control gateway system respectively binds the IMEI and the VNI of the enterprise account and the employee account of the enterprise, the CPE automatically uploads the IMEI and the VNI of the CPE to the authentication control gateway system, and whether the enterprise account and the employee account binding IMEI and the VNI of the enterprise are matched is checked;
s4, the Wi-Fi terminal of the user is connected with the SSID of the CPE of the user side, the Wi-Fi terminal sends a DHCP request, the DHCP request packet is transmitted to an authentication control gateway through a VXLAN tunnel, and the authentication control gateway checks whether the CPE VNI of the user side in the data packet is legal or not;
s5, the Wi-Fi terminal of the user submits an employee account password to an authentication control gateway for identity verification through a WEB, weChat or APP authentication mode;
S6, after the identity verification in the S5 is passed, the authentication control gateway performs online processing on the employee account, and maps an IP (Internet protocol) of the same network segment as the enterprise side application in a gateway NAT address pool;
And S7, accessing the enterprise side application by the user Wi-Fi terminal, and performing network behavior management, flow control and access log audit on the user Wi-Fi terminal by the authentication control gateway.
2. The method for constructing the mobile enterprise private line based on the 5G slice, as claimed in claim 1, is characterized in that: and the authentication control gateway in the S2 verifies the mobile phone number of the gateway local system, if the mobile phone number is legal, the mobile phone number and the source IP are processed online, and if the mobile phone number is illegal, the data packet corresponding to the source IP is refused to respond.
3. The method for constructing the mobile enterprise private line based on the 5G slice, as claimed in claim 1, is characterized in that: in the step S3, the authentication control gateway system verifies whether the enterprise account number and the employee account number binding IMEI and VNI of the enterprise are matched, if the enterprise account number and the employee account number binding IMEI and VNI of the enterprise are matched, the authentication control gateway system responds to the data packet of the CPE on the enterprise side and the CPE on the user side, establishes a VXLAN tunnel with the CPE on the enterprise side and the CPE on the user side, and if the enterprise account number and the employee account number binding IMEI and VNI of the enterprise are not matched, refuses to respond to the data packet of the source IP corresponding to the CPE.
4. The method for constructing the mobile enterprise private line based on the 5G slice, as claimed in claim 1, is characterized in that: in the step S4, the authentication control gateway verifies whether the CPE VNI of the user side in the data packet is legal or not, if the CPE VNI of the user side is legal, the authentication control gateway normally responds to a DHCP request message, and the Wi-Fi terminal of the user normally acquires the IP; if the CPE VNI at the user side is illegal, the authentication control gateway refuses to respond to the DHCP request message.
CN202410103265.8A 2024-01-24 2024-01-24 Construction method and system of mobile enterprise private line based on 5G slicing Pending CN118102297A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410103265.8A CN118102297A (en) 2024-01-24 2024-01-24 Construction method and system of mobile enterprise private line based on 5G slicing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410103265.8A CN118102297A (en) 2024-01-24 2024-01-24 Construction method and system of mobile enterprise private line based on 5G slicing

Publications (1)

Publication Number Publication Date
CN118102297A true CN118102297A (en) 2024-05-28

Family

ID=91148378

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410103265.8A Pending CN118102297A (en) 2024-01-24 2024-01-24 Construction method and system of mobile enterprise private line based on 5G slicing

Country Status (1)

Country Link
CN (1) CN118102297A (en)

Similar Documents

Publication Publication Date Title
CN103975568B (en) There is safety management system and the method for managing security of multiple Relay Servers
CN101714918A (en) Safety system for logging in VPN and safety method for logging in VPN
CN116032533A (en) Remote office access method and system based on zero trust
CN114995214A (en) Method, system, device, equipment and storage medium for remotely accessing application
EP1775903B1 (en) A dynamic tunnel construction method for secure access to a private LAN and apparatus therefor
CN107438074A (en) The means of defence and device of a kind of ddos attack
CN105162787A (en) Method and apparatus of external network terminal for accessing manufacture device or internal network terminal
WO2017012142A1 (en) Dual-connection security communication method and apparatus
CN106330479A (en) A device operation and maintenance method and system
CN111988328A (en) A method and system for ensuring data security of a collection terminal of a power generation unit in a new energy power plant
CN114205815A (en) Method and system for authentication control of 5G private network
CN108966216A (en) A kind of method of mobile communication and device applied to power distribution network
CN108881127A (en) A kind of method and system of control remote access permission
CN106789952B (en) Method and system for serving local area network into internet
CN202652534U (en) Mobile terminal security access platform
CN115665737A (en) Internet of things terminal authentication method based on zero trust architecture
CN109639658B (en) Data transmission method and device for firewall of operation and maintenance of power secondary system
CN103475491A (en) Remote maintenance system which is logged in to safely without code and achieving method
CN115174262A (en) Method and device for safely accessing internal network and electronic equipment
CN117119463A (en) CPE security authentication method and system for 5G private network
CN111586017A (en) Communication user authentication method and device
CN118102297A (en) Construction method and system of mobile enterprise private line based on 5G slicing
CN115412348A (en) Method for realizing API zero trust based on white list mechanism
US11178542B1 (en) Method and system for secure device-to-device data communications
WO2024066059A1 (en) Industrial internet security system and method based on sdp and edge computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination