Font Size: a A A

The Research Of Web VPN Based On SSL And Implementation Of The Client

Posted on:2005-05-12Degree:MasterType:Thesis
Country:ChinaCandidate:N ZhangFull Text:PDF
GTID:2168360152469164Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
The widespread use of Internet demands Intranet's function area exceeds the boundary of its location. At the same time, data transferred on network requires a high degree of security. As applications have moved to Web, it became a hot field that how to deliver the flexibility of "anywhere" access without being intrusive on the end-user.SSL is on top of the transport layer and based on RSA and secret-key mechanism. It is used to establish an encrypted channel between web browsers and servers. The service SSL provides includes: users and servers' authentication, encryption of data to protect it from stealing, and keeping the integrity of data. Under the forwarded safe system model and by analysis of SSL, the designed Web VPN implemented a smooth transition from C/S to B/S structure. The total scheme of Web VPN's design is Object's Safety. Object's Safety does not means encryption of tunnel, but transferring the encrypted object in the tunnel, so the key point is to keep safety of the single protocol object. Now legacy applications do work on SSL, not on TCP any more. By programming with Applet, the goal was achieved. Digital signature was adopted to let Applet cast off the safe restriction of Java platform. All of which help Web VPN to implement the standing feature-"clientness". What's more, the client supports proxy settings in the browsers. This new VPN structure puts away the shortages such as boring settings, and frequent adaptions because of changing of locations. The private handshake protocol has been designed and implemented, with the help of which the client was equipped with an engine of application which let user can select applications freely. Above all, Web VPN supplied an anytime and anywhere remote access of private network. Users can get the files they want from internal network safely and conveniently, just like they are there.
Keywords/Search Tags:SSL, VPN, Private Handshake Protocol, Object Security, Applet
PDF Full Text Request
Related items