Safe intercommunication method and apparatus between two isolated networks

A network-to-network, security technology, applied in the field of security intercommunication, can solve the problem of huge server system cost, etc., and achieve the effect of communication security, convenient installation, and complete functions

Inactive Publication Date: 2009-07-22
ASAT CHINA TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the above method, a special intermediate server system is needed to realize each operation request in the above method, and the server system includes a series of independent functions such as a World Wide Web server, a protocol processor, a content converter, a verification manager, and a data storage device. Information processing equipment, the server system is costly; and, in the above method, when the user's access authority is verified, the user can always allow it to perform specific operations on the private network without being limited by the length of access time, when other When the external device also needs to perform the same specific operation on the private network, it can only wait for the last user to complete the operation and exit the private network before being eligible for access operations. When the network performs a specific operation, this method will bring very unfavorable consequences to the operators and managers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe intercommunication method and apparatus between two isolated networks
  • Safe intercommunication method and apparatus between two isolated networks
  • Safe intercommunication method and apparatus between two isolated networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be further described in detail below with reference to the embodiments of the drawings.

[0033] On the one hand, the present invention provides an improved method for providing safe access to resources maintained on independent networks, and establishes secure communication for devices between two independent networks. This method can be accessed by the access object through the use of a standard web browser. The intercommunication agent transfers to authorize specific operations to the interviewed object. The intercommunication agent can be in two independent networks—independent network 1 and independent network 2, or in a public network outside the two independent networks, but the intercommunication network must maintain communication with the outside world through the public network ,see figure 1 .

[0034] Such as figure 2 As long as the above-mentioned interworking agent receives the access request of the access object, it will automatic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a safe intercommunication method between two independent networks, wherein the information transfer between the visited object and the visited object is carried out through an intercommunication agent, and the intercommunication agent first verifies the specific operation requested by the visited object, and after the verification is passed, it is the accessed object and the visited object. The interviewed object establishes a secure communication channel and sets a timer for access time limitation. When the access operation time exceeds the interval of the timer, the secure communication channel is forcibly disconnected; the secure communication channel is also restricted by the access authority level of the accessed object. When an access user with high-level access needs to immediately access the interviewed object to operate, the interviewed object will immediately cut off the access of the low-level access user, and when the access user with advanced access is accessing the interviewed object, other access objects have no right Intervention; the above method has a higher safety factor, and the management is more humane; the device for realizing the intercommunication agent has complete functions, and each functional module is concentrated in the same device, which has the advantages of convenient portability and installation.

Description

Technical field [0001] The invention relates to a safe intercommunication method between two independent networks and a device for implementing the method. Background technique [0002] Generally, web browsers such as Netscape Navigator or Microsoft Explorer are used to access public networks such as the Internet, because these web browsers can display and reproduce Hypertext Markup Language (HTML) documents provided by remote server devices, allowing clients The computer user requests and retrieves resources from the remote server device via the Internet, and executes the script program embedded in the HTML document at the same time, so as to provide the user with a certain local function. [0003] However, for some private networks, the internal resources and information are kept confidential, and the external network is not allowed to be easily accessed and browsed, and it is not allowed to be modified. For security reasons, private networks are usually protected by firewalls,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/46H04L9/32
Inventor 梁俊林苑
Owner ASAT CHINA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products