A control system and method suitable for secure access to intranet data

A control system and data security technology, applied in the field of network security, can solve problems such as the inability to guarantee internal and external network security, and achieve the effect of ensuring absolute security and improving security.

Active Publication Date: 2021-05-04
XI AN JIAOTONG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In view of the high security requirements of the intranet, commonly used network security technologies such as security gateways and VPNs cannot guarantee the security of intranet access

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A control system and method suitable for secure access to intranet data
  • A control system and method suitable for secure access to intranet data
  • A control system and method suitable for secure access to intranet data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the implementation manners of the present invention will be described in detail below in conjunction with the drawings and embodiments.

[0044] refer to figure 1 , the present invention is a control system suitable for secure access to intranet data, which is mainly used to realize secure access to intranet data by terminal equipment, including:

[0045] 1. The system starts the security authentication subsystem

[0046] The system startup security authentication subsystem mainly realizes the security control when the terminal equipment accesses the intranet under different network environments, and solves the security problems encountered by the terminal equipment during the system startup phase of the terminal equipment, including the self-loop encryption module of the boot program and the data isolation module of the internal and external network ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A control system suitable for safe access to intranet data, including a system startup security authentication subsystem and an intranet connection security authentication subsystem. The system startup security authentication subsystem solves the security problems encountered by the terminal equipment during the startup phase. It uses the self-loop encryption of the boot program to prevent it from being tampered with, and sets the hard disk read and write permissions to store the intranet data in isolation. The data security control chip executes the erasure of local sensitive data; the intranet connection security authentication subsystem solves the security problems encountered when the terminal device is connected to the intranet, uses the fixed key of the terminal device to establish an encrypted data channel, and synchronizes the white list of intranet access Audit the behavior of terminal equipment. When the audit fails for many times, the intranet gateway will issue a remote sensitive data erasure command. The present invention provides the specific logic flow and practical strategy of the above system, which can be used in organizations that have high requirements for intranet data security and require terminal equipment to have certain data protection capabilities.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a control system suitable for secure access to intranet data. Background technique [0002] The development of network information technology is gestating a new industrial and technological revolution, but it also brings huge security risks. Hackers have also frequently intruded on smart cars and smart home devices. The Mirai botnet and its variants have controlled tens of millions of smart cameras and smart routers around the world. [0003] At present, physical isolation of internal and external networks is the most commonly used network security defense mode. But this mode cannot be protected according to the security level. Since mobile office has become a daily work mode, departments and industries such as government, medical care, and finance that are not at the highest level of security must access the unit's business intranet to process daily busine...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/62
CPCG06F21/62H04L63/0209H04L63/0428H04L63/083H04L63/101H04L63/20
Inventor 管晓宏王平辉秦涛马小博陶敬孙飞扬王翔宇
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products