Font Size: a A A

The Research And Design Of Enterprise Network Terminal Access Control

Posted on:2015-08-24Degree:MasterType:Thesis
Country:ChinaCandidate:Y LvFull Text:PDF
GTID:2298330467962375Subject:Information security
Abstract/Summary:PDF Full Text Request
With the rapid development of mobile technology, mobile terminal, network and application show the characteristics of diversity and flexibility, notebook computer, the intelligent mobile phone and tablet computer and other mobile terminals have been widely access to the corporate network by various means, the traditional access control technologiesare facing enormous challenges.Compared with traditional desktop technology,the Cloud desktop technology has more advantages,which are easier for strengthening the centralized management and system reinforcing, etc.the Cloud desktop technology can further ensures the terminals’ safe and controllable, so as to relieve the mobile terminal security access challenges, however, since thecloud desktop hasthe security limitations itself, it is difficult to give consideration for the requirements ofthe enterprise to user identity authentication and single sign on.Based on the above mentioned problems and combine with the traditional terminal security access technology, this article firstly discuss the unified identityauthentication system which is basis for the access to enterprises, thenusethe safe access gateway which combined with the unified identity authentication as the first barrierfor mobile device access. Secondly from the mobile security access point of view, the article put forward a set of technology integration scheme based on the enterprise information security and trust system and safety technical tools, which using security enhanced cloud desktop to improve the security control ability when mobile application resources access, and as the second barrierfor the mobile device access. Lastly, the article combine with the unified identity authentication system, designed the trust transfer mechanism for the Cloud desktop application access and the encrypted key transmission mechanism for the data access, as the third barrier for mobile device access. Through the above study, and based on the security access gateway and cloud desktop technology, it finally realizes the technology to control the corporate terminal access. Compared with traditional access technologies like the traditional SSL VPN and safe access gateway, etc., the technology is more suitable for the mobile terminals’security access, and it will enhance the security of enterprise mobile terminal access.Meanwhile, since itcombined the current development trend of the Cloud technology, this technology is suitable for the general mobile access terminal and has popularizing significance for enterprises.
Keywords/Search Tags:Access Control, Unified Identity Authentication, Cloud Desktop, Trust Transfer
PDF Full Text Request
Related items