US Patent Application 18350011. METHOD FOR DETERMINING TRUSTED TERMINAL AND RELATED APPARATUS simplified abstract

From WikiPatents
Jump to navigation Jump to search

METHOD FOR DETERMINING TRUSTED TERMINAL AND RELATED APPARATUS

Organization Name

HUAWEI TECHNOLOGIES CO., LTD.


Inventor(s)

Le Li of Hangzhou (CN)

Huajia Wu of Beijing (CN)

Yongqiang Xu of Hangzhou (CN)

Xiaolei Cheng of Hangzhou (CN)

METHOD FOR DETERMINING TRUSTED TERMINAL AND RELATED APPARATUS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18350011 titled 'METHOD FOR DETERMINING TRUSTED TERMINAL AND RELATED APPARATUS

Simplified Explanation

The abstract describes a method and apparatus for determining a trusted terminal in a zero trust network security architecture. This method improves the security of the architecture by establishing a trusted connection between the terminal and a policy control apparatus. Here are the key points:

  • The method is applied to a zero trust network security architecture.
  • The terminal sends an access request when it wants to access an application server.
  • A policy control apparatus sends an HTTPS connection request to the terminal based on the access request.
  • The terminal sends verification information to the policy control apparatus in response to the HTTPS connection request.
  • The policy control apparatus performs verification on the verification information.
  • If the verification is successful, the terminal establishes an HTTPS connection with the policy control apparatus.
  • The establishment of the HTTPS connection indicates that the terminal is considered a trusted terminal in the network.


Original Abstract Submitted

A method for determining a trusted terminal and a related apparatus, which are applied to a zero trust network security architecture, improves security of the zero trust architecture. The method includes: a terminal sends an access request when the terminal accesses an application server. A policy control apparatus sends an HTTPS connection request to the terminal based on the access request from the terminal. The terminal sends verification information to the policy control apparatus based on the HTTPS connection request. The policy control apparatus performs verification on the verification information. After the verification on the verification information succeeds, the terminal successfully establishes an HTTPS connection to the policy control apparatus. The HTTPS connection indicates that the terminal is a trusted terminal.