Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Unidirectional protocol isolation method and device in network

A protocol and network technology, which is applied in the field of one-way protocol isolation devices, can solve problems such as attacks and achieve the effect of improving security

Inactive Publication Date: 2008-02-20
BEIJING CITY UNIVERSITY
View PDF0 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once the firewall fails due to attacks or failures, or cannot properly realize its functions, the always-existing TCP / IP connection becomes the evil hand of the attacker to attack the protected network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unidirectional protocol isolation method and device in network
  • Unidirectional protocol isolation method and device in network
  • Unidirectional protocol isolation method and device in network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Isolation is a security technical means implemented to protect the high-security network environment. However, due to the different semantics of isolation, different isolation technologies are produced. The original can be summarized as follows:

[0029] 1. Complete isolation (Disconnection) technology: This method requires the internal and external networks to operate independently and completely cut off the connection between each other, which is what we call a dual-machine dual-network system. So as to achieve or approach the absolute security state; the disadvantage is that the information exchange is very inconvenient, the cost is high, and the maintenance and use are inconvenient. It is a method with outstanding disadvantages and advantages. This is also the biggest disadvantage of the first generation of isolation technology, which is a serious waste of resources;

[0030] 2. Physical isolation (Isolation) technology (i.e. isolation = electronic switch): hard dis...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The utility model discloses a unidirectional protocol isolation method in network and the special device. The utility model truly realizes unidirectional protocol isolation between the internal and the external network, ensures the safety of the internal network, eliminates the direct dialogue between hackers and the internal network, and has the functions of virus prevention, visit control and safe auditing; the data can only be transmitted unidirectionally from the network with a lower safety grade to the network with a higher safety grade; contrarily, when the data packet is transmitted from a credible terminal to an incredible terminal, hardware circuit support is not available and the data circulation is impossible, thus data in internal network with higher grade leaking out to the network with lower grade is impossible, the security of the system is improved further.

Description

technical field [0001] The invention relates to a one-way protocol isolation method in a network, which performs one-way protocol isolation on data transmitted in the network, and a corresponding one-way protocol isolation device. Background technique [0002] The Internet has grown to be a huge success today. The development and popularization of network applications such as e-commerce and e-government not only bring great convenience to people's life, but also create huge wealth. But at the same time, the Internet has also brought many terrible things to people, such as hackers, viruses, Trojan horses, etc., data has been tampered with and stolen, and files have been destroyed. While enjoying the joy brought by the Internet, people are also suffering from various 47.1% of users claim to have encountered computer intrusion within one year [CNNIC "Statistical Report on Internet Development in China"]. More and more enterprises and government departments have begun to use s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24
Inventor 郭乐深张乃靖史乃彪
Owner BEIJING CITY UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products