Protection system for data security transmission between computer and disc

A data security and protection system technology, applied in computer security devices, digital data protection, computing, etc., can solve problems such as low efficiency, inability to realize data security transmission, confidential data leakage, etc.

Inactive Publication Date: 2009-04-08
中国人民解放军海军通信应用研究所
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method is not only inefficient, but also, if there is a Trojan horse virus in the portable device, or human error, it will lead to the leakage of confidential data
The data security of the one-way physical isolation gatekeeper involved in the published patent CN1878172A depends on the write protection mechanism of the USB memory hardware, and the switching must be realized by the software of the computer, so this invention can only realize data between computers with different confidentiality levels. Secure transmission, unable to achieve secure data transmission between portable storage devices of different confidentiality levels and computers, and between portable storage devices of different confidentiality levels; in addition, the system has additional USB memory hardware overhead, if the data to be copied at one time is very large, then The storage space of the USB memory is correspondingly very large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection system for data security transmission between computer and disc
  • Protection system for data security transmission between computer and disc
  • Protection system for data security transmission between computer and disc

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] figure 1 It is a simple schematic diagram of the system to be designed, wherein the "data security transmission device" is the hardware core device to be realized in the present invention. The device mainly has two USB interfaces (but the interface can also use COM port, Ethernet port or their various combination interfaces, etc.), one is A port, which is used to connect low-density portable storage devices or computers; the other is B port. Port, used to connect high-density mobile hard disk, U disk or computer. When working, the data of the low-secret equipment connected to port A is read in through the USB interface of the data security transmission device, and then the data just read is output to the connected high-secret computer or portable device through the USB interface of port B in the device. In order to ensure that the secret-related data in the high-secret equipment connected to the B port will not leak to the low-secret equipment connected to the A port,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The security protection system of computer transferring data with disk belongs to the field of the technology of data security. It is characterized in that it is a kind of system to protect the process of transferring secret data that is stored in the computer or different kinds of storage module. The system mainly includes a data-security unidirectional transducer with which the data is transferred from the low-secret device to high-secret device and the high-secret and low-secret software in the computer. The invention can solve effectively the problem that the high-secret data files is given away to the low-secret computer or disk which is the result from the virus, other objective or subjective results, or copying the data from the different secrets computers to another, different secrets portable storage devices to the computer, different secrets portable storage devices to another.

Description

technical field [0001] The invention relates to a computer and disk data security transmission protection system, which belongs to the technical field of data security protection. Background technique [0002] Due to the needs of national information security, troops, agencies, and secret-related enterprises are all faced with how to ensure that low-secret equipment (including low-secret computers or low-secret storage devices, etc.) Securely transfer file data. The so-called security is to ensure that when copying data and transferring files, data can only be transferred from low-class equipment to high-class equipment in one direction, and confidential data in high-class devices will not be leaked to low-class devices. At present, the commonly used method is to physically separate devices with different security levels, or manually use portable storage devices (such as: CF cards, memory sticks, U disks, removable hard disks, etc.) The data on the computer is copied to th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F12/14G06F21/60
Inventor 谢翔潘圣杨霞吕燕赵晓红赵玉生鞠茂光
Owner 中国人民解放军海军通信应用研究所
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products