Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Full-duplex firewall protection method supporting mandatory access control

A mandatory access control and firewall technology, applied in the field of network security, can solve problems such as inability to intensify linkage defense, and achieve the effect of efficient analysis

Active Publication Date: 2019-03-19
SHENZHEN Y& D ELECTRONICS CO LTD
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Firewalls that integrate multiple additional functions such as VPN, PKI, IPSec, anti-virus, and intrusion prevention in an extensive manner are in a discrete security form under the coupling relationship of fragmented services. In the face of dynamic and complex network attacks, they cannot Implement adaptive and intensive linkage defense in the network application environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Full-duplex firewall protection method supporting mandatory access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The characteristics and exemplary embodiments of various aspects of the present invention will be described in detail below. In order to make the purpose, technical solutions and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only configured to explain the present invention, not to limit the present invention. It will be apparent to one skilled in the art that the present invention may be practiced without some of these specific details. The following description of the embodiments is only to provide a better understanding of the present invention by showing examples of the present invention.

[0038] It should be noted that in this article, relational terms such as first and second are only used to distinguish one entity or operation from another entity or operation, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention discloses a full-duplex firewall protection method supporting mandatory access control. The method comprises the following steps of: S1, the full-duplex firewall being an intrusion detection system in a form of a distributed node network; S2, the full-duplex firewall establishing an endogenous security mechanism rule in the form of ''requesting operation chain and service response tree'' based on a business operation flow of a differentiated role authority; S3, the full-duplex firewall supporting a request operation detection under full-scale parsing at the levelof boundary environment and computing environment, and completing an integrity protection; S4, performing a consistency response detection, and completing a confidentiality protection facing information assets and system services which are hierarchically defined; S5, supporting dispatching and control for normal / abnormal network traffic through SDN, inducing suspicious traffic to a honeynet trap,and forming a business audit forensics under workflow trace.

Description

technical field [0001] The invention relates to the field of network security, in particular to a full-duplex firewall protection method supporting mandatory access control. Background technique [0002] In important industries and fields such as transportation, government affairs, energy, finance, and communications, key information infrastructure is integrated and controlled, which is directly related to the lifeline of the country. National economy and people's livelihood and public interest. Aiming at the severe challenges brought about by complex network topology, open and converged environment, multiple access terminals, massive business applications and unknown vulnerability backdoors in critical information infrastructure, propose and build solutions to reverse the passive situation of "blocking and killing" and adhere to "manageable A controllable defense-in-depth security system and the establishment of a controllable risk-controllable "skynet recovery, sparse but...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0218H04L63/0227H04L63/101H04L63/1416H04L63/1425H04L63/1491
Inventor 戚建淮郑伟范宋晶刘建辉
Owner SHENZHEN Y& D ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products