Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network safety isolating and information exchanging system and method based on proxy mapping

An information exchange and network security technology, applied in the field of network security isolation and information exchange system based on proxy mapping, can solve the problems of increasing user cost, management complexity, poor real-time and scalability, etc.

Inactive Publication Date: 2005-01-26
SHANGHAI JIAO TONG UNIV
View PDF0 Cites 48 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is that the user needs to go through two complete caches and forwards to receive or send data, which is equivalent to two proxy servers on the internal and external networks mirroring and synchronizing data through security isolation and information exchange systems. The real-time performance and scalability are poor.
In addition, in addition to the security isolation and information exchange system, users also need to configure additional internal and external network servers, which increases user costs and management complexity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network safety isolating and information exchanging system and method based on proxy mapping
  • Network safety isolating and information exchanging system and method based on proxy mapping
  • Network safety isolating and information exchanging system and method based on proxy mapping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The technical solution of the present invention will be further described below in conjunction with the accompanying drawings. figure 1 It is a structural block diagram of the security isolation and information exchange system. In the prototype system, the internal and external network processing units choose the X86-based industrial control system, and the high-speed data transmission line can use SCSI or USB buses. According to the different buses, different isolation switching control units can be realized, and the corresponding isolation memory can be selected, such as SCSI or USB interface hard disk.

[0040] The operating system of the internal and external network processing units selects the Linux operating system, and the protocol stack in the system is shown in Figure 2. The proxy engine communicates with the intranet processing unit through the isolation switching unit, and performs virus filtering and security inspection on the data. The internal network p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to network security isolation based on agent mapping and information exchanging system and its method. It uses in information exchanging field and network data exchanging field. The in-out net processing units are each connected to the inner net and the outer net in the system. Isolation exchanging unit includes isolation switching controller and isolation storage. The in-out net processing units are connected to the isolation switching controller through high speed data transmission line. The isolation switching controller is connected to the isolation storage. Only one of the in-out net processing units can assess the isolation storage. The in-out net processing units exchange the information through the isolation exchanging unit. The inner net processing unit includes an agent stub and the outer net processing unit includes an agent engine. The method of the invention is that the inner defined transmission interface is called by the agent stub and the agent engine, and the date is exchanged between the in-out net processing units by isolation exchanging unit. So this can construct an information exchanging channel between the inner net client end and the outer net server in the form of agent mapping.

Description

technical field [0001] The invention relates to a system and method for network security isolation and information exchange, in particular to a system and method for network security isolation and information exchange based on proxy mapping. It is used in the fields of information security and network data exchange. Background technique [0002] The currently widely used network border security protection mechanism is implemented through firewalls. The implementation technologies of firewall include mainly packet filtering, application proxy and state inspection. Since the hardware architecture of the firewall adopts a single bastion host, once it is captured by hackers, the firewall will completely lose its effectiveness. Therefore, ordinary network firewall products can no longer meet the security requirements of important networks and data. For users with high-level requirements for network security, such as finance, government and scientific research institutions, the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/12H04L29/06
Inventor 潘理李建华王凯王杰
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products