Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Control system suitable for secure access of intranet data

A control system and data security technology, applied in the field of network security, can solve problems such as the inability to guarantee internal and external network security, and achieve the effect of improving security and preventing hackers from tampering

Active Publication Date: 2020-11-06
XI AN JIAOTONG UNIV
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In view of the high security requirements of the intranet, commonly used network security technologies such as security gateways and VPNs cannot guarantee the security of intranet access

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control system suitable for secure access of intranet data
  • Control system suitable for secure access of intranet data
  • Control system suitable for secure access of intranet data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the implementation manners of the present invention will be described in detail below in conjunction with the drawings and embodiments.

[0044] refer to figure 1 , the present invention is a control system suitable for secure access to intranet data, which is mainly used to realize secure access to intranet data by terminal equipment, including:

[0045] 1. The system starts the security authentication subsystem

[0046] The system startup security authentication subsystem mainly realizes the security control when the terminal equipment accesses the intranet under different network environments, and solves the security problems encountered by the terminal equipment during the system startup phase of the terminal equipment, including the self-loop encryption module of the boot program and the data isolation module of the internal and external network ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A control system suitable for secure access of intranet data comprises a system starting security authentication subsystem and an intranet connection security authentication subsystem. The system starting safety authentication subsystem solves the safety problem encountered in the starting stage of terminal equipment, self-loop encryption is conducted through a bootstrap program to prevent data from being tampered with, hard disk read-write permission is set for isolated storage of intranet data, and when the terminal equipment fails to be started multiple times, a data safety control chip executes local sensitive data erasure. The intranet connection security authentication subsystem solves the security problem encountered when the terminal equipment is connected with the intranet, an encrypted data channel is established by using a fixed key of the terminal equipment, an intranet access white list is synchronized to audit the behavior of the terminal equipment, and when audit does not succeed for multiple times, an intranet gateway sends a remote sensitive data erasure instruction. The invention provides a specific logic process and a practical strategy of the system, and the system can be applied to an organization which has high requirements on intranet data security and requires terminal equipment to have certain data protection capability.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a control system suitable for secure access to intranet data. Background technique [0002] The development of network information technology is gestating a new industrial and technological revolution, but it also brings huge security risks. Hackers have also frequently intruded on smart cars and smart home devices. The Mirai botnet and its variants have controlled tens of millions of smart cameras and smart routers around the world. [0003] At present, physical isolation of internal and external networks is the most commonly used network security defense mode. But this mode cannot be protected according to the security level. Since mobile office has become a daily work mode, departments and industries such as government, medical care, and finance that are not at the highest level of security must access the unit's business intranet to process daily busine...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/62
CPCG06F21/62H04L63/0209H04L63/0428H04L63/083H04L63/101H04L63/20
Inventor 管晓宏王平辉秦涛马小博陶敬孙飞扬王翔宇
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products